Matanbuchus 3.0 Revives: New ClickFix Tactics Deploy AstarionRAT, Raising Stealth Threat Levels

Matanbuchus 3.0 Resurfaces: Exploiting ClickFix Tactics for Stealthy AstarionRAT Deployment

In February 2026, the notorious Malware-as-a-Service (MaaS) loader, Matanbuchus, re-emerged after nearly a year of dormancy. This latest version, 3.0, has undergone a comprehensive code overhaul and now commands a steep subscription fee of up to $15,000 per month, a significant increase from its previous pricing. This escalation indicates a strategic pivot towards high-value, targeted operations, moving away from the broader spam campaigns of its earlier iterations.

Central to Matanbuchus 3.0’s strategy is the exploitation of the ClickFix social engineering technique. This method deceives users into manually executing malicious commands under the pretense of resolving fictitious browser errors or software updates. By manipulating user trust rather than exploiting software vulnerabilities, this approach effectively circumvents traditional security defenses. Victims are presented with convincing prompts instructing them to copy and paste specific PowerShell or Run dialog commands. The malicious URLs employed in these prompts utilize backslashes and path traversal sequences to obfuscate their true nature, complicating detection by logging systems. Since the user initiates the process, many standard email and perimeter defenses are bypassed. Once executed, these commands trigger a silent installation process that operates without any visible user interface, further evading detection.

Security analysts have identified that this campaign delivers a previously unseen payload known as AstarionRAT immediately following infection. This custom remote access trojan is equipped with twenty-four distinct commands, including capabilities for credential theft and SOCKS5 proxying. The impact is often swift, with operators moving laterally across the network within forty minutes to target domain controllers. The ultimate objective appears to be the deployment of ransomware or data exfiltration, underscoring the critical need for early detection by enterprise security teams.

The Silent Infection Chain

The infection mechanism employed by Matanbuchus 3.0 is intricately designed to evade automated detection systems. The process begins when the victim executes a mixed-case `msiexec` command that retrieves a payload from a newly registered domain. Upon execution, the installer drops a legitimate but vulnerable Zillya Antivirus binary alongside a malicious DLL into deceptive directories mimicking fake vendors like AegisLynx or DocuRay.

To further conceal its activities, the malware utilizes a renamed version of the 7-Zip utility to extract a password-protected archive containing the next stage components. The malicious DLL is then side-loaded by the antivirus engine to decrypt the Matanbuchus loader. This complex chain eventually launches an embedded Lua interpreter, which executes the final AstarionRAT payload directly into memory, leaving minimal forensic artifacts on the disk for investigators to find.

Mitigation Strategies

Given the sophisticated nature of Matanbuchus 3.0 and its use of advanced social engineering tactics, organizations must adopt a multi-layered defense strategy:

1. Endpoint Detection and Response (EDR): Implement robust EDR solutions capable of identifying and responding to suspicious activities, such as unusual `msiexec` commands or the creation of atypical directories in `%APPDATA%`.

2. User Education: Conduct regular cybersecurity training sessions to educate employees about the dangers of executing unsolicited commands and the importance of verifying the authenticity of software updates and error messages.

3. Network Monitoring: Monitor network traffic for connections to recently registered or suspicious domains, which may indicate malicious activity.

4. Access Controls: Enforce strict access controls and least privilege principles to limit the potential impact of a compromised account.

5. Incident Response Planning: Develop and regularly update incident response plans to ensure swift action can be taken in the event of a security breach.

By implementing these strategies, organizations can enhance their resilience against sophisticated threats like Matanbuchus 3.0 and protect their critical assets from potential compromise.