Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Mamba 2FA

25
Global rank
14 infographic chevron month
Month rank
17 infographic chevron week
Week rank
0
IOCs

Mamba 2FA is an advanced phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) and target Microsoft 365 accounts. It focuses on intercepting authentication flows in real-time and enables threat actors to hijack user sessions and access sensitive systems even when additional security measures are in place.

Phishingkit
Type
Unknown
Origin
1 October, 2023
First seen
1 November, 2025
Last seen

How to analyze Mamba 2FA with ANY.RUN

Type
Unknown
Origin
1 October, 2023
First seen
1 November, 2025
Last seen

IOCs

Domains
drensyoons1sedt.com
grastoonm3vides.com
sandoom2notnt.com
1messisnfarm.com
4sessionmoon.com
thirdmandomavis.com
planchereserver.com
sithchibb.com
3alphabetjay.com
seven-oranges.com
copefood.xyz
88mansession.com
5poleanalhy.com
7motionmansa.com
10decadesmen.com
10trioneyue8ss.com
voltampereactive.com
nine9manforest.com
hypexfinancial.com
copelustration.xyz
Last Seen at

Recent blog posts

post image
Release Notes: ANY.RUN & ThreatQ Integrat...
watchers 127
comments 0
post image
What is a Malware Sandbox? Everything SOC Ana...
watchers 460
comments 0
post image
Major Cyber Attacks in October 2025: Phishing...
watchers 3238
comments 0

What is Mamba 2FA malware?

Mamba 2FA is part of a growing class of malware that specifically targets multi-factor authentication mechanisms. It is a sophisticated phishing toolkit that leverages AiTM techniques to intercept user credentials and MFA tokens in real time.

The malware, which has been scrutinized and investigated by multiple researchers, including ANY.RUN's analyst team, mimics legitimate Microsoft services, such as OneDrive, SharePoint, and voicemail systems, using highly convincing fake login pages. It is marketed on Telegram and sold for as low as $250 per month, making it accessible to a wide range of threat actors, from novices to seasoned cybercriminals. Its infrastructure has evolved since its first documentation to include proxy servers and regularly updated phishing URLs to evade detection.

It typically operates by injecting malicious code into browsers, intercepting authentication tokens, or manipulating session cookies. Some variants also incorporate phishing components and man-in-the-browser (MitB) capabilities. Mamba 2FA attacks are highly targeted and often occur during high-value transactions or sensitive logins, making them especially dangerous for businesses, financial services, and critical infrastructure.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Mamba 2FA Victimology

Mamba 2FA primarily targets users of Microsoft 365, including both enterprise and consumer accounts. Organizations relying on non-phishing-resistant MFA methods, such as one-time passwords (OTPs) and app notifications, are particularly vulnerable.

Industries with heavy Microsoft 365 usage, such as finance, healthcare, and technology, are prime targets due to their valuable data and reliance on cloud-based services. The platform’s ability to customize phishing pages to reflect corporate branding makes it especially effective against employees who may not recognize the signs of phishing.

Geographically, campaigns have been observed in Europe, North America, and parts of Asia, often coinciding with politically or economically motivated attacks.

What Mamba Can Do to User Device

While Mamba 2FA itself is not a traditional malware that installs malicious code on endpoint devices, its impact is significant. Once a user enters credentials and MFA tokens on a phishing page, attackers gain immediate access to the victim’s account. This can lead to:

  • Unauthorized Access: Attackers can log into Microsoft 365 accounts, accessing sensitive emails, files, and data stored in OneDrive or SharePoint.

  • Data Theft: Sensitive information, such as financial records or intellectual property, can be exfiltrated.

  • Account Takeover: Attackers can change account settings, lock out legitimate users, or use the account for further malicious activities, such as sending phishing emails to other users.

  • Lateral Movement: Compromised accounts can serve as entry points for broader network attacks, potentially leading to ransomware or data breaches.

How Mamba 2FA Threatens Businesses and Organizations

Mamba 2FA poses a severe threat to businesses due to its ability to bypass MFA, a cornerstone of modern cybersecurity. The platform’s low cost and ease of use democratize advanced phishing capabilities, enabling even low-skill attackers to execute sophisticated campaigns. Key threats include:

  • Financial Loss: Stolen data or compromised accounts can lead to direct financial theft or costly ransomware attacks.
  • Reputational Damage: Data breaches erode customer trust and can lead to regulatory penalties.
  • Operational Disruption: Account takeovers can disrupt business operations, particularly if critical systems or communications are compromised.
  • Scalability: As a PhaaS platform, Mamba 2FA allows attackers to target multiple organizations simultaneously, increasing the scale and impact of attacks.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How Does Mamba 2FA Function?

Typically, this malware:

  • Uses phishing emails or compromised websites to deliver the malware.
  • Hooks into the browser or network stack to monitor authentication flows.
  • In real-time, intercepts or relays 2FA codes back to the attacker.
  • Enables session replay or steals authentication cookies to access targets without triggering 2FA.

Core operations are organized through a two-layer infrastructure:

  1. Link Domains: They host phishing pages that mimic Microsoft services, using Base64-encoded parameters to customize the page for specific targets. Invalid parameters trigger redirection to benign error pages (e.g., Google 404) to evade detection.
  2. Relay Servers: Powered by Socket.IO, these servers facilitate real-time communication between the phishing page and Microsoft’s authentication servers, intercepting credentials and MFA tokens. Attackers use stolen data to authenticate as the victim, bypassing MFA protections.

The platform supports non-phishing-resistant MFA methods, integrates with Entra ID, AD FS, and third-party SSO providers, and instantly transmits stolen credentials and cookies via Telegram bots. It also employs sandbox detection to block automated security scans, enhancing its stealth.

Mamba 2FA Typical Attack Chain

The primary attack vector for Mamba 2FA is phishing emails, which serve as the initial point for luring victims outside the secure perimeter of corporate environments. The HTML attachments contain obfuscated JavaScript code that redirects users to phishing pages, often hosted on services like Cloudflare R2 or IPFS.

Common lures include:

  • Voicemail notifications, often with an SVG file.

  • File access notifications for OneDrive/SharePoint.

  • Payment or invoice receipts.

  • Password expiration notices.

    Each of these delivery methods can be detonated and effectively analyzed in ANY.RUN’s Sandbox service using its ML functionality.

Sandbox analysis of Mamba 2FA sample with a voice message notification

Mamba 2FA malware analysis in the Sandbox
Mamba 2FA analysis in the Sandbox

Sandbox analysis of Mamba 2FA sample with a password expiration notice

Mamba 2FA malware analysis in the Sandbox
Another Mamba 2FA sample detonated in the Sandbox

Mamba 2FA uses a fingerprinting mechanism to filter users before redirecting to either a phishing or benign page. After clicking the link from the phishing email, the victim lands on a filtering page that collects device and browser data. This data is sent to a server that decides whether to redirect the user to a phishing page mimicking Microsoft services or to a safe dead-end page. Fingerprinting transmission can be tracked through the Suricata rule "ET PHISHING Javascript Browser Fingerprinting POST Request".

Fingerprinting request in Mamba 2FA activity
Fingerprinting request in Mamba 2FA activity

After passing filtering, the user is redirected to a phishing page created based on templates that mimic Microsoft authorization pages, including OneDrive and SharePoint. For corporate accounts, Mamba 2FA pulls backgrounds and icons corresponding to the target organization's branding using legitimate Microsoft CDNs, which increases the page's credibility. The phishing page URL typically contains a domain/base64 pattern, where parameters such as IP address, victim's email address, service identifier (e.g., Office 365), campaign, or unique user identifier are encoded in Base64 format for masking and complicating analysis.

In implementing the "Adversary-in-the-Middle" (AiTM) technique, Mamba 2FA uses the Socket.IO JavaScript library to organize real-time communication through WebSocket, which is one of the main differences from other phishing kits.

Gathering Threat Intelligence on Mamba 2FA malware

Threat intelligence is critical in combating Mamba 2FA by providing real-time insights into its infrastructure, tactics, and IOCs. It enables organizations to:

  • Identify Attack Patterns: Recognize phishing email signatures, URL structures, and relay server IPs.
  • Update Defenses: Incorporate IOCs into firewalls, intrusion detection systems, and email filters.
  • Proactive Response: Anticipate and block emerging threats by tracking Mamba 2FA’s evolution on platforms like Telegram.
  • Collaboration: Share intelligence with industry peers to improve collective defenses.

Services such as Threat Intelligence Lookup from ANY.RUN allow identifying and blocking Mamba2FA infrastructure, including domains and IPs, at the network perimeter.

Start gathering IOCs and behavioral data with the malware name search request to Threat Intelligence Lookup:

threatName:"mamba"

Mamba 2 FA samples found via TI Lookup Mamba 2 FA samples recently analyzed in the Sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Mamba 2FA represents a growing class of post-authentication threats capable of undermining modern security infrastructures. As more organizations adopt MFA, attackers evolve to bypass it. Understanding how Mamba 2FA works and using threat intelligence to detect and disrupt its lifecycle is essential for proactive defense. Organizations must pair robust technical controls with actionable data to stay ahead of these advanced threats.

Gather fresh actionable threat intelligence via ANY.RUN’s TI Lookup: start with 50 trial requests.

HAVE A LOOK AT

Mallox screenshot
Mallox
mallox
Mallox is a ransomware strain that emerged in 2021, known for its ability to encrypt files and target database servers using vulnerabilities like RDP. Often distributed through phishing campaigns and exploiting exposed SQL servers, it locks victims' data and demands a ransom. Mallox operates as a Ransomware-as-a-Service (RaaS), making it accessible to affiliates who use it to conduct attacks.
Read More
DeerStealer screenshot
DeerStealer
deerstealer
DeerStealer is an information-stealing malware discovered in 2024 by ANY.RUN, primarily targeting sensitive data such as login credentials, browser history, and cryptocurrency wallet details. It is often distributed through phishing campaigns and fake Google ads that mimic legitimate platforms like Google Authenticator. Once installed, it exfiltrates the stolen data to a remote command and control (C2) server. DeerStealer’s ability to disguise itself as legitimate downloads makes it particularly dangerous for unsuspecting users.
Read More
Gh0st RAT screenshot
Gh0st RAT
gh0st
Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.
Read More
Netwalker screenshot
Netwalker
netwalker ransomware
Netwalker is ransomware — it belongs to a malware family which encrypts files and demands users to pay a ransom to get their data back. Netwalker utilizes several sophisticated techniques, such as process hollowing and code obfuscation to target corporate victims.
Read More
Phishing kit screenshot
Phishing kit
tycoon evilproxy sneaky2fa
Phishing kits are pre-packaged sets of malicious tools designed to make it easy for cybercriminals to launch phishing attacks. These kits replicate legitimate websites, steal credentials, and often include backend infrastructure for managing stolen data.
Read More
Sneaky 2FA screenshot
Sneaky 2FA
sneaky2fa
Sneaky 2FA is an Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts. Distributed as a Phishing-as-a-Service (PhaaS) through a Telegram bot, this malware bypasses two-factor authentication (2FA) to steal credentials and session cookies, posing a significant threat to individuals and organizations.
Read More