Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Mamba 2FA

19
Global rank
8 infographic chevron month
Month rank
9 infographic chevron week
Week rank
0
IOCs

Mamba 2FA is an advanced phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) and target Microsoft 365 accounts. It focuses on intercepting authentication flows in real-time and enables threat actors to hijack user sessions and access sensitive systems even when additional security measures are in place.

Phishingkit
Type
Unknown
Origin
1 October, 2023
First seen
4 February, 2026
Last seen

How to analyze Mamba 2FA with ANY.RUN

Type
Unknown
Origin
1 October, 2023
First seen
4 February, 2026
Last seen

IOCs

Domains
drensyoons1sedt.com
grastoonm3vides.com
sandoom2notnt.com
1messisnfarm.com
4sessionmoon.com
thirdmandomavis.com
planchereserver.com
sithchibb.com
3alphabetjay.com
seven-oranges.com
copefood.xyz
88mansession.com
5poleanalhy.com
7motionmansa.com
10decadesmen.com
10trioneyue8ss.com
voltampereactive.com
nine9manforest.com
hypexfinancial.com
copelustration.xyz
Last Seen at

Recent blog posts

post image
Enterprise Phishing: How Attackers Abuse Trus...
watchers 1272
comments 0
post image
SOC & Business Success with ANY.RUN: Real...
watchers 2511
comments 0
post image
Attackers Are Taking Over Real Email Threads...
watchers 5773
comments 0

What is Mamba 2FA malware?

Mamba 2FA is part of a growing class of malware that specifically targets multi-factor authentication mechanisms. It is a sophisticated phishing toolkit that leverages AiTM techniques to intercept user credentials and MFA tokens in real time.

The malware, which has been scrutinized and investigated by multiple researchers, including ANY.RUN's analyst team, mimics legitimate Microsoft services, such as OneDrive, SharePoint, and voicemail systems, using highly convincing fake login pages. It is marketed on Telegram and sold for as low as $250 per month, making it accessible to a wide range of threat actors, from novices to seasoned cybercriminals. Its infrastructure has evolved since its first documentation to include proxy servers and regularly updated phishing URLs to evade detection.

It typically operates by injecting malicious code into browsers, intercepting authentication tokens, or manipulating session cookies. Some variants also incorporate phishing components and man-in-the-browser (MitB) capabilities. Mamba 2FA attacks are highly targeted and often occur during high-value transactions or sensitive logins, making them especially dangerous for businesses, financial services, and critical infrastructure.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Mamba 2FA Victimology

Mamba 2FA primarily targets users of Microsoft 365, including both enterprise and consumer accounts. Organizations relying on non-phishing-resistant MFA methods, such as one-time passwords (OTPs) and app notifications, are particularly vulnerable.

Industries with heavy Microsoft 365 usage, such as finance, healthcare, and technology, are prime targets due to their valuable data and reliance on cloud-based services. The platform’s ability to customize phishing pages to reflect corporate branding makes it especially effective against employees who may not recognize the signs of phishing.

Geographically, campaigns have been observed in Europe, North America, and parts of Asia, often coinciding with politically or economically motivated attacks.

What Mamba Can Do to User Device

While Mamba 2FA itself is not a traditional malware that installs malicious code on endpoint devices, its impact is significant. Once a user enters credentials and MFA tokens on a phishing page, attackers gain immediate access to the victim’s account. This can lead to:

  • Unauthorized Access: Attackers can log into Microsoft 365 accounts, accessing sensitive emails, files, and data stored in OneDrive or SharePoint.

  • Data Theft: Sensitive information, such as financial records or intellectual property, can be exfiltrated.

  • Account Takeover: Attackers can change account settings, lock out legitimate users, or use the account for further malicious activities, such as sending phishing emails to other users.

  • Lateral Movement: Compromised accounts can serve as entry points for broader network attacks, potentially leading to ransomware or data breaches.

How Mamba 2FA Threatens Businesses and Organizations

Mamba 2FA poses a severe threat to businesses due to its ability to bypass MFA, a cornerstone of modern cybersecurity. The platform’s low cost and ease of use democratize advanced phishing capabilities, enabling even low-skill attackers to execute sophisticated campaigns. Key threats include:

  • Financial Loss: Stolen data or compromised accounts can lead to direct financial theft or costly ransomware attacks.
  • Reputational Damage: Data breaches erode customer trust and can lead to regulatory penalties.
  • Operational Disruption: Account takeovers can disrupt business operations, particularly if critical systems or communications are compromised.
  • Scalability: As a PhaaS platform, Mamba 2FA allows attackers to target multiple organizations simultaneously, increasing the scale and impact of attacks.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How Does Mamba 2FA Function?

Typically, this malware:

  • Uses phishing emails or compromised websites to deliver the malware.
  • Hooks into the browser or network stack to monitor authentication flows.
  • In real-time, intercepts or relays 2FA codes back to the attacker.
  • Enables session replay or steals authentication cookies to access targets without triggering 2FA.

Core operations are organized through a two-layer infrastructure:

  1. Link Domains: They host phishing pages that mimic Microsoft services, using Base64-encoded parameters to customize the page for specific targets. Invalid parameters trigger redirection to benign error pages (e.g., Google 404) to evade detection.
  2. Relay Servers: Powered by Socket.IO, these servers facilitate real-time communication between the phishing page and Microsoft’s authentication servers, intercepting credentials and MFA tokens. Attackers use stolen data to authenticate as the victim, bypassing MFA protections.

The platform supports non-phishing-resistant MFA methods, integrates with Entra ID, AD FS, and third-party SSO providers, and instantly transmits stolen credentials and cookies via Telegram bots. It also employs sandbox detection to block automated security scans, enhancing its stealth.

Mamba 2FA Typical Attack Chain

The primary attack vector for Mamba 2FA is phishing emails, which serve as the initial point for luring victims outside the secure perimeter of corporate environments. The HTML attachments contain obfuscated JavaScript code that redirects users to phishing pages, often hosted on services like Cloudflare R2 or IPFS.

Common lures include:

  • Voicemail notifications, often with an SVG file.

  • File access notifications for OneDrive/SharePoint.

  • Payment or invoice receipts.

  • Password expiration notices.

    Each of these delivery methods can be detonated and effectively analyzed in ANY.RUN’s Sandbox service using its ML functionality.

Sandbox analysis of Mamba 2FA sample with a voice message notification

Mamba 2FA malware analysis in the Sandbox
Mamba 2FA analysis in the Sandbox

Sandbox analysis of Mamba 2FA sample with a password expiration notice

Mamba 2FA malware analysis in the Sandbox
Another Mamba 2FA sample detonated in the Sandbox

Mamba 2FA uses a fingerprinting mechanism to filter users before redirecting to either a phishing or benign page. After clicking the link from the phishing email, the victim lands on a filtering page that collects device and browser data. This data is sent to a server that decides whether to redirect the user to a phishing page mimicking Microsoft services or to a safe dead-end page. Fingerprinting transmission can be tracked through the Suricata rule "ET PHISHING Javascript Browser Fingerprinting POST Request".

Fingerprinting request in Mamba 2FA activity
Fingerprinting request in Mamba 2FA activity

After passing filtering, the user is redirected to a phishing page created based on templates that mimic Microsoft authorization pages, including OneDrive and SharePoint. For corporate accounts, Mamba 2FA pulls backgrounds and icons corresponding to the target organization's branding using legitimate Microsoft CDNs, which increases the page's credibility. The phishing page URL typically contains a domain/base64 pattern, where parameters such as IP address, victim's email address, service identifier (e.g., Office 365), campaign, or unique user identifier are encoded in Base64 format for masking and complicating analysis.

In implementing the "Adversary-in-the-Middle" (AiTM) technique, Mamba 2FA uses the Socket.IO JavaScript library to organize real-time communication through WebSocket, which is one of the main differences from other phishing kits.

Gathering Threat Intelligence on Mamba 2FA malware

Threat intelligence is critical in combating Mamba 2FA by providing real-time insights into its infrastructure, tactics, and IOCs. It enables organizations to:

  • Identify Attack Patterns: Recognize phishing email signatures, URL structures, and relay server IPs.
  • Update Defenses: Incorporate IOCs into firewalls, intrusion detection systems, and email filters.
  • Proactive Response: Anticipate and block emerging threats by tracking Mamba 2FA’s evolution on platforms like Telegram.
  • Collaboration: Share intelligence with industry peers to improve collective defenses.

Services such as Threat Intelligence Lookup from ANY.RUN allow identifying and blocking Mamba2FA infrastructure, including domains and IPs, at the network perimeter.

Start gathering IOCs and behavioral data with the malware name search request to Threat Intelligence Lookup:

threatName:"mamba"

Mamba 2 FA samples found via TI Lookup Mamba 2 FA samples recently analyzed in the Sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Mamba 2FA represents a growing class of post-authentication threats capable of undermining modern security infrastructures. As more organizations adopt MFA, attackers evolve to bypass it. Understanding how Mamba 2FA works and using threat intelligence to detect and disrupt its lifecycle is essential for proactive defense. Organizations must pair robust technical controls with actionable data to stay ahead of these advanced threats.

Gather fresh actionable threat intelligence via ANY.RUN’s TI Lookup: start with 50 trial requests.

HAVE A LOOK AT

Salvador Stealer screenshot
Salvador Stealer
salvador
Salvador Stealer is a powerful, information-stealing Android malware designed to silently infiltrate systems, extract sensitive data, and exfiltrate it to cybercriminals. Often sold on underground forums, it is part of the growing ecosystem of “stealers-as-a-service” (SaaS) tools that target individuals and organizations alike.
Read More
BTMOB RAT screenshot
BTMOB RAT
btmob
BTMOB RAT is a remote access Trojan (RAT) designed to give attackers full control over infected devices. It targets Windows and Android endpoints. Its modular structure allows operators to tailor capabilities, making it suitable for espionage, credential theft, financial fraud, and establishing long-term footholds in corporate networks.
Read More
Keylogger screenshot
Keylogger
keylogger
A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.
Read More
Cephalus screenshot
Cephalus
cephalus
Cephalus is a targeted ransomware threat discovered in 2025. It’s known for infiltrating organizations that deal with sensitive data through compromised RDP access. It leverages DLL sideloading with a legitimate SentinelOne executable. Cephalus is able to exfiltrate data and destroy backup options. Its payload is also tailored to each victim, which makes identification and mitigation more complex.
Read More
Cactus Ransomware screenshot
Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
Read More
HijackLoader screenshot
HijackLoader
hijackloader
HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.
Read More