Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Mamba 2FA

24
Global rank
11 infographic chevron month
Month rank
24 infographic chevron week
Week rank
0
IOCs

Mamba 2FA is an advanced phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) and target Microsoft 365 accounts. It focuses on intercepting authentication flows in real-time and enables threat actors to hijack user sessions and access sensitive systems even when additional security measures are in place.

Phishingkit
Type
Unknown
Origin
1 October, 2023
First seen
20 September, 2025
Last seen

How to analyze Mamba 2FA with ANY.RUN

Type
Unknown
Origin
1 October, 2023
First seen
20 September, 2025
Last seen

IOCs

Domains
drensyoons1sedt.com
grastoonm3vides.com
sandoom2notnt.com
1messisnfarm.com
4sessionmoon.com
thirdmandomavis.com
planchereserver.com
sithchibb.com
3alphabetjay.com
seven-oranges.com
copefood.xyz
88mansession.com
5poleanalhy.com
7motionmansa.com
10decadesmen.com
10trioneyue8ss.com
voltampereactive.com
nine9manforest.com
hypexfinancial.com
copelustration.xyz
Last Seen at

Recent blog posts

post image
Efficient SOC: How to Detect and Solve Incide...
watchers 477
comments 0
post image
ANY.RUN & Palo Alto Networks Cortex XSOAR...
watchers 572
comments 0
post image
Lazarus Group Attacks in 2025: Here's Everyth...
watchers 3857
comments 0

What is Mamba 2FA malware?

Mamba 2FA is part of a growing class of malware that specifically targets multi-factor authentication mechanisms. It is a sophisticated phishing toolkit that leverages AiTM techniques to intercept user credentials and MFA tokens in real time.

The malware, which has been scrutinized and investigated by multiple researchers, including ANY.RUN's analyst team, mimics legitimate Microsoft services, such as OneDrive, SharePoint, and voicemail systems, using highly convincing fake login pages. It is marketed on Telegram and sold for as low as $250 per month, making it accessible to a wide range of threat actors, from novices to seasoned cybercriminals. Its infrastructure has evolved since its first documentation to include proxy servers and regularly updated phishing URLs to evade detection.

It typically operates by injecting malicious code into browsers, intercepting authentication tokens, or manipulating session cookies. Some variants also incorporate phishing components and man-in-the-browser (MitB) capabilities. Mamba 2FA attacks are highly targeted and often occur during high-value transactions or sensitive logins, making them especially dangerous for businesses, financial services, and critical infrastructure.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Mamba 2FA Victimology

Mamba 2FA primarily targets users of Microsoft 365, including both enterprise and consumer accounts. Organizations relying on non-phishing-resistant MFA methods, such as one-time passwords (OTPs) and app notifications, are particularly vulnerable.

Industries with heavy Microsoft 365 usage, such as finance, healthcare, and technology, are prime targets due to their valuable data and reliance on cloud-based services. The platform’s ability to customize phishing pages to reflect corporate branding makes it especially effective against employees who may not recognize the signs of phishing.

Geographically, campaigns have been observed in Europe, North America, and parts of Asia, often coinciding with politically or economically motivated attacks.

What Mamba Can Do to User Device

While Mamba 2FA itself is not a traditional malware that installs malicious code on endpoint devices, its impact is significant. Once a user enters credentials and MFA tokens on a phishing page, attackers gain immediate access to the victim’s account. This can lead to:

  • Unauthorized Access: Attackers can log into Microsoft 365 accounts, accessing sensitive emails, files, and data stored in OneDrive or SharePoint.

  • Data Theft: Sensitive information, such as financial records or intellectual property, can be exfiltrated.

  • Account Takeover: Attackers can change account settings, lock out legitimate users, or use the account for further malicious activities, such as sending phishing emails to other users.

  • Lateral Movement: Compromised accounts can serve as entry points for broader network attacks, potentially leading to ransomware or data breaches.

How Mamba 2FA Threatens Businesses and Organizations

Mamba 2FA poses a severe threat to businesses due to its ability to bypass MFA, a cornerstone of modern cybersecurity. The platform’s low cost and ease of use democratize advanced phishing capabilities, enabling even low-skill attackers to execute sophisticated campaigns. Key threats include:

  • Financial Loss: Stolen data or compromised accounts can lead to direct financial theft or costly ransomware attacks.
  • Reputational Damage: Data breaches erode customer trust and can lead to regulatory penalties.
  • Operational Disruption: Account takeovers can disrupt business operations, particularly if critical systems or communications are compromised.
  • Scalability: As a PhaaS platform, Mamba 2FA allows attackers to target multiple organizations simultaneously, increasing the scale and impact of attacks.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How Does Mamba 2FA Function?

Typically, this malware:

  • Uses phishing emails or compromised websites to deliver the malware.
  • Hooks into the browser or network stack to monitor authentication flows.
  • In real-time, intercepts or relays 2FA codes back to the attacker.
  • Enables session replay or steals authentication cookies to access targets without triggering 2FA.

Core operations are organized through a two-layer infrastructure:

  1. Link Domains: They host phishing pages that mimic Microsoft services, using Base64-encoded parameters to customize the page for specific targets. Invalid parameters trigger redirection to benign error pages (e.g., Google 404) to evade detection.
  2. Relay Servers: Powered by Socket.IO, these servers facilitate real-time communication between the phishing page and Microsoft’s authentication servers, intercepting credentials and MFA tokens. Attackers use stolen data to authenticate as the victim, bypassing MFA protections.

The platform supports non-phishing-resistant MFA methods, integrates with Entra ID, AD FS, and third-party SSO providers, and instantly transmits stolen credentials and cookies via Telegram bots. It also employs sandbox detection to block automated security scans, enhancing its stealth.

Mamba 2FA Typical Attack Chain

The primary attack vector for Mamba 2FA is phishing emails, which serve as the initial point for luring victims outside the secure perimeter of corporate environments. The HTML attachments contain obfuscated JavaScript code that redirects users to phishing pages, often hosted on services like Cloudflare R2 or IPFS.

Common lures include:

  • Voicemail notifications, often with an SVG file.

  • File access notifications for OneDrive/SharePoint.

  • Payment or invoice receipts.

  • Password expiration notices.

    Each of these delivery methods can be detonated and effectively analyzed in ANY.RUN’s Sandbox service using its ML functionality.

Sandbox analysis of Mamba 2FA sample with a voice message notification

Mamba 2FA malware analysis in the Sandbox
Mamba 2FA analysis in the Sandbox

Sandbox analysis of Mamba 2FA sample with a password expiration notice

Mamba 2FA malware analysis in the Sandbox
Another Mamba 2FA sample detonated in the Sandbox

Mamba 2FA uses a fingerprinting mechanism to filter users before redirecting to either a phishing or benign page. After clicking the link from the phishing email, the victim lands on a filtering page that collects device and browser data. This data is sent to a server that decides whether to redirect the user to a phishing page mimicking Microsoft services or to a safe dead-end page. Fingerprinting transmission can be tracked through the Suricata rule "ET PHISHING Javascript Browser Fingerprinting POST Request".

Fingerprinting request in Mamba 2FA activity
Fingerprinting request in Mamba 2FA activity

After passing filtering, the user is redirected to a phishing page created based on templates that mimic Microsoft authorization pages, including OneDrive and SharePoint. For corporate accounts, Mamba 2FA pulls backgrounds and icons corresponding to the target organization's branding using legitimate Microsoft CDNs, which increases the page's credibility. The phishing page URL typically contains a domain/base64 pattern, where parameters such as IP address, victim's email address, service identifier (e.g., Office 365), campaign, or unique user identifier are encoded in Base64 format for masking and complicating analysis.

In implementing the "Adversary-in-the-Middle" (AiTM) technique, Mamba 2FA uses the Socket.IO JavaScript library to organize real-time communication through WebSocket, which is one of the main differences from other phishing kits.

Gathering Threat Intelligence on Mamba 2FA malware

Threat intelligence is critical in combating Mamba 2FA by providing real-time insights into its infrastructure, tactics, and IOCs. It enables organizations to:

  • Identify Attack Patterns: Recognize phishing email signatures, URL structures, and relay server IPs.
  • Update Defenses: Incorporate IOCs into firewalls, intrusion detection systems, and email filters.
  • Proactive Response: Anticipate and block emerging threats by tracking Mamba 2FA’s evolution on platforms like Telegram.
  • Collaboration: Share intelligence with industry peers to improve collective defenses.

Services such as Threat Intelligence Lookup from ANY.RUN allow identifying and blocking Mamba2FA infrastructure, including domains and IPs, at the network perimeter.

Start gathering IOCs and behavioral data with the malware name search request to Threat Intelligence Lookup:

threatName:"mamba"

Mamba 2 FA samples found via TI Lookup Mamba 2 FA samples recently analyzed in the Sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Mamba 2FA represents a growing class of post-authentication threats capable of undermining modern security infrastructures. As more organizations adopt MFA, attackers evolve to bypass it. Understanding how Mamba 2FA works and using threat intelligence to detect and disrupt its lifecycle is essential for proactive defense. Organizations must pair robust technical controls with actionable data to stay ahead of these advanced threats.

Gather fresh actionable threat intelligence via ANY.RUN’s TI Lookup: start with 50 trial requests.

HAVE A LOOK AT

Emmenhtal screenshot
Emmenhtal
emmenhtal
First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments.
Read More
Sliver screenshot
Sliver
sliver
Sliver is an open-source command-and-control (C2) framework that has been increasingly adopted by threat actors as an alternative to tools like Cobalt Strike. Developed by security firm Bishop Fox, Sliver was initially intended for legitimate security testing and red teaming exercises. However, its robust features and open-source nature have made it attractive to malicious actors seeking to control compromised systems.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
WarmCookie screenshot
WarmCookie
badspace
WarmCookie is a backdoor malware that cyber attackers use to gain initial access to targeted systems. It is often distributed through phishing emails, frequently using job recruitment lures to entice victims into downloading and executing the malware.
Read More
XRed screenshot
XRed
xred
XRed operates as a stealthy backdoor, enabling cybercriminals to gain unauthorized remote access to infected systems. XRed has gained particular notoriety for its distribution through trojanized legitimate software and hardware drivers, making it exceptionally dangerous due to its ability to masquerade as trusted applications.
Read More
Qilin Ransomware screenshot
Qilin ransomware (predecessor known as “Agenda”) is a rapidly evolving ransomware-as-a-service (RaaS) operation targeting organizations worldwide. Known for double extortion tactics (encrypting files while also threatening to leak stolen data) Qilin has quickly gained notoriety for its customization, flexibility, and impact on critical infrastructure.
Read More