Matanbuchus 3.0 Loader Delivers AstarionRAT in Hands-On Intrusion
Huntress responds to ClickFix intrusion deploying Matanbuchus 3.0 and custom AstarionRAT. Attackers achieved lateral movement within 40 minutes.
Huntress disclosed details of a hands-on-keyboard intrusion that began with a ClickFix infection and ended with attackers moving laterally across domain controllers within 40 minutes. The attack chain deployed Matanbuchus 3.0, a loader that returned after a year-long hiatus, and dropped a previously undocumented RAT the researchers dubbed AstarionRAT.
The incident response, published by Huntress this week, provides a detailed breakdown of how initial access through social engineering escalates to full network compromise when defenders don't intervene quickly.
ClickFix Continues to Work
The intrusion started with ClickFix, the social engineering technique that tricks users into executing malicious commands themselves. We've covered multiple ClickFix variants this month, and the technique remains effective because it bypasses browser and email security controls.
In this case, a fake security alert prompted the victim to copy and paste a command into the Windows Run dialog. That command triggered a PowerShell chain that ultimately installed Matanbuchus through a silent MSI deployment.
Silent MSI installations avoid user notification dialogs, letting malware install without visible prompts. The victim sees nothing unusual after pasting the initial command.
Matanbuchus Returns
Matanbuchus is a Malware-as-a-Service loader that went quiet around May 2025. Version 3.0 represents a complete code rewrite with expanded capabilities:
- Support for running EXE, DLL, shellcode, and MSI payloads from disk or in memory
- Reverse shell functionality via CMD and PowerShell
- WQL query execution for system reconnaissance
- High-quality screenshot capture
- A morphing engine to maintain clean builds without crypters
- Multiple delivery formats including MSI, EXE, DLL, ISO, and BIN
The subscription pricing reflects the tooling's sophistication: $10,000/month for the HTTPS version and $15,000/month for the DNS-based variant. Those prices put Matanbuchus in the premium tier of loader services, competing with tools typically reserved for ransomware operators and sophisticated threat groups.
AstarionRAT: A New Custom Implant
The most interesting element was the payload: a fully featured RAT that Huntress had never seen before. AstarionRAT supports 24 distinct commands:
- SOCKS5 proxy for tunneling traffic through infected hosts
- Credential theft targeting browsers and system stores
- Reflective code loading to execute additional payloads in memory
- Port scanning for internal network reconnaissance
- Shell execution via CMD and PowerShell
The RAT uses RSA-encrypted command-and-control traffic disguised as application telemetry. This design helps the traffic blend with legitimate software beacon patterns, complicating network-based detection.
Rapid Lateral Movement
The operator returned the next day after initial infection. What happened next demonstrates why initial access is just the beginning:
Within 40 minutes, the attacker:
- Moved laterally to a Windows Server
- Compromised two domain controllers
- Used PsExec for remote execution
- Created rogue administrator accounts
- Added Windows Defender exclusions to prevent detection
The speed suggests either automation, experience, or both. Once attackers have working credentials and a foothold, domain compromise doesn't require sophisticated techniques, just systematic execution.
Defensive Takeaways
This intrusion follows patterns we've tracked across ransomware deployments and financially motivated attacks. The combination of social engineering, commodity malware, and hands-on operation makes these threats difficult to prevent entirely.
Detection opportunities exist at multiple stages:
- ClickFix execution - Monitor for suspicious PowerShell launched from user-initiated commands
- Silent MSI installation - Alert on msiexec.exe with quiet installation flags
- Unusual scheduled tasks - Matanbuchus establishes persistence through scheduled tasks
- Lateral movement indicators - PsExec usage, remote service creation, new administrator accounts
Organizations running endpoint detection should review whether their tools catch the specific behavioral patterns described. The Huntress report includes IOCs and detection signatures for those wanting to validate coverage.
For teams still struggling with ClickFix-style attacks, the fundamental defense remains user education. No technical control stops a user who willingly executes malicious commands. Training users to recognize social engineering prompts, however effective they appear, remains the primary countermeasure.
Related Articles
LeakNet Ransomware Ditches IABs for ClickFix and Deno
LeakNet ransomware now uses ClickFix social engineering via hacked websites and a Deno-based in-memory loader to evade detection. Here's how the attack chain works.
Mar 18, 2026AI-Generated Slopoly Backdoor Powers Interlock Ransomware Attacks
IBM X-Force discovers Hive0163 using LLM-generated Slopoly malware in Interlock ransomware attacks, marking a shift in how threat actors weaponize AI to accelerate malware development.
Mar 13, 2026Velvet Tempest Deploys CastleRAT via ClickFix Attacks
Ransomware affiliate Velvet Tempest uses ClickFix social engineering to deploy DonutLoader and CastleRAT in 12-day intrusion linked to Termite ransomware staging.
Mar 10, 2026ClickFix Campaign Deploys MIMICRAT Through Compromised BIN Sites
Elastic Security Labs uncovers ClickFix campaign abusing compromised bincheck.io to deliver MIMICRAT, a custom C++ RAT with SOCKS5 tunneling and token impersonation capabilities.
Feb 21, 2026