New Phishing Attack delivers Matanbuchus Malware to drop Cobalt Strike Beacons
Incident Report for Ascend Security Events
Resolved
New Phishing Attack delivers Matanbuchus malware to drop Cobalt Strike beacons

Source: Bleeping Computer

Analysts at Bleeping Computer have recently compiled research done by several security analysts to warn users regarding a spike in phishing attacks that deliver the 'Matanbuchus' malware to drop Cobalt Strike beacons on compromised machines. Matanbuchus is a malware-as-a-service (MaaS) project first spotted in dark web advertisements while Cobalt Strike is a penetration testing suite that is frequently used by threat actors for lateral movement and to drop additional payloads.

The malspam campaign currently underway uses lures that pretend to be replies to previous email conversations, so they feature a 'Re:' in the subject line. The emails carry a ZIP attachment that contains an HTML file that generates a new ZIP archive. This ultimately extracts an MSI package digitally signed with a valid certificate issued by DigiCert for "Westeast Tech Consulting, Corp.".

If executed, two Matanbuchus DLL payloads ("main.dll") are dropped in two different locations, a scheduled task is created to maintain persistence across system reboots, and communication with the command and control (C2) server is established. Finally, Matanbuchus loads the Cobalt Strike payload from the C2 server, opening the way to wider exploitation potential.

Indicators of Compromise:
• 72426e6b8ea42012675c07bf9a2895bcd7eae15c82343b4b71aece29d96a7b22
• 6b2428fcf9e3a555a3a29fc5582baa1eda15e555c1c85d7bef7ac981d76b6068
• af534b21a0a0b0c09047e1f3d4f0cdd73fb37f03b745dbb42ffd2340a379dc42
• b9720e833fa96fec76f492295d7a46b6f524b958278d322c4ccecdc313811f11
• 23fe3af756e900b5878ec685b2c80acd6f821453c03d10d23871069b23a02926
• 53af0319d68b0dcbf7cb37559ddfd70cce8c526614c218b5765babdc54500a49
• 4242064d3f62b0ded528d89032517747998d2fe9888d5feaa2a3684de2370912
• d0e2e92ec9d3921dc73b962354c7708f06a1a34cce67e8b67af4581adfc7aaad
• 56ec91b8e594824a678508b694a7107d55cf9cd77a1e01a6a44993836b40ec7a
• cc08642ddbbb8f735a3263180164cda6cf3b73a490fc742d5c3e31130504e97c
• e3b98dac9c4c57a046c50ce530c79855c9fe4025a9902d0f45b0fb0394409730
• c117b17bf187a3d52278eb229a1f2ac8a73967d162ad0cfc55089d304b1cc8a7
• 82add858e5a64789b26c77e5ec4608e1f162aacbc9163920a0d4aa53eb3e9713
• 5708dced57f30ff79e789401360300fe3d5bdcf8f988ede6539b9608dfeb58fd
• 63242d49d842cdf699b0ec04ad7bba8867080f8337d3e0ec7e768d10573142b3
• 6c5eb5d9a66200f0ab69ee49ba6411abf29840bce00ed0681ec8b48e24fd83da
• ef4ea3976bad1cd68a2da2d926677c0cb04f4fc6e0b629b9a29a1c61ae984c46
• 19bbebd1e8ec335262e846149a893f4ce803f201e4dee7f3770d95287f9245f3
• de26167160e7df91bbd992a3523ea6a82049932b947452bb58e9eed3011c769a
• 7f0bf9496f21050fbc1a3ce5ad35dc300f595c71ad9e73ff5fc5c06b2e35a435
• 1bc74dfb2142e4929244c6c7e10415664d4e71a5301eaf8e03cb426fab0876f8
• face46e6593206867da39e47001f134a00385898a36b8142a21ad54954682666
• e22ec74cd833a85882d5a8e76fa3b35daff0b7390bfbcd6b1ab270fd3741ceea
• 2d8740ea16e9457a358ebea73ad377ff75f7aa9bdf748f0d801f5a261977eda4
• 5dcbffef867b44bbb828cfb4a21c9fb1fa3404b4d8b6f4e8118c62addbf859da
• c6e9477fd41ac9822269486c77d0f5d560ee2f558148ca95cf1de39dea034186
• 4fd90cf681ad260f13d3eb9e38b0f05365d3984e38cfba28f160b0f810ffd4d3
• 7e37d028789ab2b47bcab159da6458da2e8198617b0e7760174e4a0eea07d9c9
• f8cc2cf36e193774f13c9c5f23ab777496dcd7ca588f4f73b45a7a5ffa96145e
• 0a7e8fd68575db5f84c18b9a26e4058323d1357e2a29a5b12278e4bfa6939489
• 39ec827d24fe68d341cff2a85ef0a7375e9c313064903b92d4c32c7413d84661
• a5b06297d86aee3c261df7415a4fa873f38bd5573523178000d89a8d5fd64b9a
• bd68ecd681b844232f050c21c1ea914590351ef64e889d8ef37ea63bd9e2a2ec
• 4ee7350176014c7fcb8d33a79dcb1076794a2f86e9b2348f2715ca81f011e799
• 7643468adbc1fca4342b7458f0e1dc4ae11c0dde7c06e52fea02c1e057314def
• 6d3259011b9f2abd3b0c3dc5b609ac503392a7d8dea018b78ecd39ec097b3968
• 213.226.114.15
• 144.208.127.245
• 185.217.1.23
• 190.123.44.220

As a result, Ascend Technologies has pushed the detection ability of the known IOCs across our EDR, SIEM, and anti-malware platforms. These IOCs include IPs and hash values which will give us the ability to detect and alert. As is the case with most malware, end users are targeted which makes maintaining a robust security posture highly important, including end-user training, to develop safe and secure internet browsing habits.

Author: Evan Obal

Source: https://www.bleepingcomputer.com/news/security/new-phishing-attack-infects-devices-with-cobalt-strike/
Posted Jun 22, 2022 - 14:45 CDT