Matanbuchus 3.0 Loader Delivers AstarionRAT in Hands-On Intrusion
Huntress responds to ClickFix intrusion deploying Matanbuchus 3.0 and custom AstarionRAT. Attackers achieved lateral movement within 40 minutes.
Huntress disclosed details of a hands-on-keyboard intrusion that began with a ClickFix infection and ended with attackers moving laterally across domain controllers within 40 minutes. The attack chain deployed Matanbuchus 3.0, a loader that returned after a year-long hiatus, and dropped a previously undocumented RAT the researchers dubbed AstarionRAT.
The incident response, published by Huntress this week, provides a detailed breakdown of how initial access through social engineering escalates to full network compromise when defenders don't intervene quickly.
ClickFix Continues to Work
The intrusion started with ClickFix, the social engineering technique that tricks users into executing malicious commands themselves. We've covered multiple ClickFix variants this month, and the technique remains effective because it bypasses browser and email security controls.
In this case, a fake security alert prompted the victim to copy and paste a command into the Windows Run dialog. That command triggered a PowerShell chain that ultimately installed Matanbuchus through a silent MSI deployment.
Silent MSI installations avoid user notification dialogs, letting malware install without visible prompts. The victim sees nothing unusual after pasting the initial command.
Matanbuchus Returns
Matanbuchus is a Malware-as-a-Service loader that went quiet around May 2025. Version 3.0 represents a complete code rewrite with expanded capabilities:
- Support for running EXE, DLL, shellcode, and MSI payloads from disk or in memory
- Reverse shell functionality via CMD and PowerShell
- WQL query execution for system reconnaissance
- High-quality screenshot capture
- A morphing engine to maintain clean builds without crypters
- Multiple delivery formats including MSI, EXE, DLL, ISO, and BIN
The subscription pricing reflects the tooling's sophistication: $10,000/month for the HTTPS version and $15,000/month for the DNS-based variant. Those prices put Matanbuchus in the premium tier of loader services, competing with tools typically reserved for ransomware operators and sophisticated threat groups.
AstarionRAT: A New Custom Implant
The most interesting element was the payload: a fully featured RAT that Huntress had never seen before. AstarionRAT supports 24 distinct commands:
- SOCKS5 proxy for tunneling traffic through infected hosts
- Credential theft targeting browsers and system stores
- Reflective code loading to execute additional payloads in memory
- Port scanning for internal network reconnaissance
- Shell execution via CMD and PowerShell
The RAT uses RSA-encrypted command-and-control traffic disguised as application telemetry. This design helps the traffic blend with legitimate software beacon patterns, complicating network-based detection.
Rapid Lateral Movement
The operator returned the next day after initial infection. What happened next demonstrates why initial access is just the beginning:
Within 40 minutes, the attacker:
- Moved laterally to a Windows Server
- Compromised two domain controllers
- Used PsExec for remote execution
- Created rogue administrator accounts
- Added Windows Defender exclusions to prevent detection
The speed suggests either automation, experience, or both. Once attackers have working credentials and a foothold, domain compromise doesn't require sophisticated techniques, just systematic execution.
Defensive Takeaways
This intrusion follows patterns we've tracked across ransomware deployments and financially motivated attacks. The combination of social engineering, commodity malware, and hands-on operation makes these threats difficult to prevent entirely.
Detection opportunities exist at multiple stages:
- ClickFix execution - Monitor for suspicious PowerShell launched from user-initiated commands
- Silent MSI installation - Alert on msiexec.exe with quiet installation flags
- Unusual scheduled tasks - Matanbuchus establishes persistence through scheduled tasks
- Lateral movement indicators - PsExec usage, remote service creation, new administrator accounts
Organizations running endpoint detection should review whether their tools catch the specific behavioral patterns described. The Huntress report includes IOCs and detection signatures for those wanting to validate coverage.
For teams still struggling with ClickFix-style attacks, the fundamental defense remains user education. No technical control stops a user who willingly executes malicious commands. Training users to recognize social engineering prompts, however effective they appear, remains the primary countermeasure.
Related Articles
ClickFix Campaign Deploys MIMICRAT Through Compromised BIN Sites
Elastic Security Labs uncovers ClickFix campaign abusing compromised bincheck.io to deliver MIMICRAT, a custom C++ RAT with SOCKS5 tunneling and token impersonation capabilities.
Feb 21, 2026ClickFix Attacks Now Abuse DNS to Evade Security Tools
Microsoft warns of ClickFix variant using nslookup commands to stage malware via DNS traffic. Delivers ModeloRAT through fileless attack chain.
Feb 19, 2026What Is Ransomware? How It Works and How to Protect Yourself
Learn what ransomware is, how attacks work, the main types including double extortion, and practical steps to defend against this growing threat.
Jan 31, 2026PDFSider Backdoor Hits Fortune 100 Firm, Linked to Qilin
Resecurity uncovers stealthy DLL-sideloading malware with APT-grade anti-VM tricks. Multiple ransomware groups now deploying it.
Jan 20, 2026