Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Mamba 2FA

21
Global rank
47 infographic chevron month
Month rank
77 infographic chevron week
Week rank
0
IOCs

Mamba 2FA is an advanced phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) and target Microsoft 365 accounts. It focuses on intercepting authentication flows in real-time and enables threat actors to hijack user sessions and access sensitive systems even when additional security measures are in place.

Phishingkit
Type
Unknown
Origin
1 October, 2023
First seen
18 May, 2026
Last seen

How to analyze Mamba 2FA with ANY.RUN

Type
Unknown
Origin
1 October, 2023
First seen
18 May, 2026
Last seen

IOCs

Domains
drensyoons1sedt.com
grastoonm3vides.com
sandoom2notnt.com
1messisnfarm.com
4sessionmoon.com
thirdmandomavis.com
planchereserver.com
sithchibb.com
3alphabetjay.com
seven-oranges.com
copefood.xyz
88mansession.com
5poleanalhy.com
7motionmansa.com
10decadesmen.com
10trioneyue8ss.com
voltampereactive.com
nine9manforest.com
hypexfinancial.com
copelustration.xyz
Last Seen at

Recent blog posts

post image
Top 5 Phishing-Driven Social Engineering Atta...
watchers 262
comments 0
post image
ANY.RUN Turns 10: Special Offers for Stronger...
watchers 1762
comments 0
post image
LATAM Under Siege: Agent Tesla's 18-Month Cre...
watchers 5372
comments 0

What is Mamba 2FA malware?

Mamba 2FA is part of a growing class of malware that specifically targets multi-factor authentication mechanisms. It is a sophisticated phishing toolkit that leverages AiTM techniques to intercept user credentials and MFA tokens in real time.

The malware, which has been scrutinized and investigated by multiple researchers, including ANY.RUN's analyst team, mimics legitimate Microsoft services, such as OneDrive, SharePoint, and voicemail systems, using highly convincing fake login pages. It is marketed on Telegram and sold for as low as $250 per month, making it accessible to a wide range of threat actors, from novices to seasoned cybercriminals. Its infrastructure has evolved since its first documentation to include proxy servers and regularly updated phishing URLs to evade detection.

It typically operates by injecting malicious code into browsers, intercepting authentication tokens, or manipulating session cookies. Some variants also incorporate phishing components and man-in-the-browser (MitB) capabilities. Mamba 2FA attacks are highly targeted and often occur during high-value transactions or sensitive logins, making them especially dangerous for businesses, financial services, and critical infrastructure.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Mamba 2FA Victimology

Mamba 2FA primarily targets users of Microsoft 365, including both enterprise and consumer accounts. Organizations relying on non-phishing-resistant MFA methods, such as one-time passwords (OTPs) and app notifications, are particularly vulnerable.

Industries with heavy Microsoft 365 usage, such as finance, healthcare, and technology, are prime targets due to their valuable data and reliance on cloud-based services. The platform’s ability to customize phishing pages to reflect corporate branding makes it especially effective against employees who may not recognize the signs of phishing.

Geographically, campaigns have been observed in Europe, North America, and parts of Asia, often coinciding with politically or economically motivated attacks.

What Mamba Can Do to User Device

While Mamba 2FA itself is not a traditional malware that installs malicious code on endpoint devices, its impact is significant. Once a user enters credentials and MFA tokens on a phishing page, attackers gain immediate access to the victim’s account. This can lead to:

  • Unauthorized Access: Attackers can log into Microsoft 365 accounts, accessing sensitive emails, files, and data stored in OneDrive or SharePoint.

  • Data Theft: Sensitive information, such as financial records or intellectual property, can be exfiltrated.

  • Account Takeover: Attackers can change account settings, lock out legitimate users, or use the account for further malicious activities, such as sending phishing emails to other users.

  • Lateral Movement: Compromised accounts can serve as entry points for broader network attacks, potentially leading to ransomware or data breaches.

How Mamba 2FA Threatens Businesses and Organizations

Mamba 2FA poses a severe threat to businesses due to its ability to bypass MFA, a cornerstone of modern cybersecurity. The platform’s low cost and ease of use democratize advanced phishing capabilities, enabling even low-skill attackers to execute sophisticated campaigns. Key threats include:

  • Financial Loss: Stolen data or compromised accounts can lead to direct financial theft or costly ransomware attacks.
  • Reputational Damage: Data breaches erode customer trust and can lead to regulatory penalties.
  • Operational Disruption: Account takeovers can disrupt business operations, particularly if critical systems or communications are compromised.
  • Scalability: As a PhaaS platform, Mamba 2FA allows attackers to target multiple organizations simultaneously, increasing the scale and impact of attacks.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How Does Mamba 2FA Function?

Typically, this malware:

  • Uses phishing emails or compromised websites to deliver the malware.
  • Hooks into the browser or network stack to monitor authentication flows.
  • In real-time, intercepts or relays 2FA codes back to the attacker.
  • Enables session replay or steals authentication cookies to access targets without triggering 2FA.

Core operations are organized through a two-layer infrastructure:

  1. Link Domains: They host phishing pages that mimic Microsoft services, using Base64-encoded parameters to customize the page for specific targets. Invalid parameters trigger redirection to benign error pages (e.g., Google 404) to evade detection.
  2. Relay Servers: Powered by Socket.IO, these servers facilitate real-time communication between the phishing page and Microsoft’s authentication servers, intercepting credentials and MFA tokens. Attackers use stolen data to authenticate as the victim, bypassing MFA protections.

The platform supports non-phishing-resistant MFA methods, integrates with Entra ID, AD FS, and third-party SSO providers, and instantly transmits stolen credentials and cookies via Telegram bots. It also employs sandbox detection to block automated security scans, enhancing its stealth.

Mamba 2FA Typical Attack Chain

The primary attack vector for Mamba 2FA is phishing emails, which serve as the initial point for luring victims outside the secure perimeter of corporate environments. The HTML attachments contain obfuscated JavaScript code that redirects users to phishing pages, often hosted on services like Cloudflare R2 or IPFS.

Common lures include:

  • Voicemail notifications, often with an SVG file.

  • File access notifications for OneDrive/SharePoint.

  • Payment or invoice receipts.

  • Password expiration notices.

    Each of these delivery methods can be detonated and effectively analyzed in ANY.RUN’s Sandbox service using its ML functionality.

Sandbox analysis of Mamba 2FA sample with a voice message notification

Mamba 2FA malware analysis in the Sandbox
Mamba 2FA analysis in the Sandbox

Sandbox analysis of Mamba 2FA sample with a password expiration notice

Mamba 2FA malware analysis in the Sandbox
Another Mamba 2FA sample detonated in the Sandbox

Mamba 2FA uses a fingerprinting mechanism to filter users before redirecting to either a phishing or benign page. After clicking the link from the phishing email, the victim lands on a filtering page that collects device and browser data. This data is sent to a server that decides whether to redirect the user to a phishing page mimicking Microsoft services or to a safe dead-end page. Fingerprinting transmission can be tracked through the Suricata rule "ET PHISHING Javascript Browser Fingerprinting POST Request".

Fingerprinting request in Mamba 2FA activity
Fingerprinting request in Mamba 2FA activity

After passing filtering, the user is redirected to a phishing page created based on templates that mimic Microsoft authorization pages, including OneDrive and SharePoint. For corporate accounts, Mamba 2FA pulls backgrounds and icons corresponding to the target organization's branding using legitimate Microsoft CDNs, which increases the page's credibility. The phishing page URL typically contains a domain/base64 pattern, where parameters such as IP address, victim's email address, service identifier (e.g., Office 365), campaign, or unique user identifier are encoded in Base64 format for masking and complicating analysis.

In implementing the "Adversary-in-the-Middle" (AiTM) technique, Mamba 2FA uses the Socket.IO JavaScript library to organize real-time communication through WebSocket, which is one of the main differences from other phishing kits.

Gathering Threat Intelligence on Mamba 2FA malware

Threat intelligence is critical in combating Mamba 2FA by providing real-time insights into its infrastructure, tactics, and IOCs. It enables organizations to:

  • Identify Attack Patterns: Recognize phishing email signatures, URL structures, and relay server IPs.
  • Update Defenses: Incorporate IOCs into firewalls, intrusion detection systems, and email filters.
  • Proactive Response: Anticipate and block emerging threats by tracking Mamba 2FA’s evolution on platforms like Telegram.
  • Collaboration: Share intelligence with industry peers to improve collective defenses.

Services such as Threat Intelligence Lookup from ANY.RUN allow identifying and blocking Mamba2FA infrastructure, including domains and IPs, at the network perimeter.

Start gathering IOCs and behavioral data with the malware name search request to Threat Intelligence Lookup:

threatName:"mamba"

Mamba 2 FA samples found via TI Lookup Mamba 2 FA samples recently analyzed in the Sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Mamba 2FA represents a growing class of post-authentication threats capable of undermining modern security infrastructures. As more organizations adopt MFA, attackers evolve to bypass it. Understanding how Mamba 2FA works and using threat intelligence to detect and disrupt its lifecycle is essential for proactive defense. Organizations must pair robust technical controls with actionable data to stay ahead of these advanced threats.

Gather fresh actionable threat intelligence via ANY.RUN’s TI Lookup: start with 50 trial requests.

HAVE A LOOK AT

Octo screenshot
Octo
octo coper
Octo malware, also known as ExobotCompact or Coper, is a sophisticated Android banking trojan that has evolved from earlier malware family Exobot. It poses a significant threat to financial institutions, mobile users, and enterprise networks.
Read More
Trojan screenshot
Trojan
trojan trojan horse
Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.
Read More
Latrodectus screenshot
Latrodectus
latrodectus
Latrodectus is a malicious loader that is used by threat actors to gain a foothold on compromised devices and deploy additional malware. It has been associated with the IcedID trojan and has been used by APT groups in targeted attacks. The malware can gather system information, launch executables, and detect sandbox environments. It uses encryption and obfuscation to evade detection and can establish persistence on the infected device.
Read More
SVCStealer screenshot
SVCStealer
svcstealer
SVCStealer is an information-stealing malware targeting sensitive user data through spear-phishing email attachments. It systematically extracts credentials, financial data, and system information from various applications, including browsers and messaging platforms.
Read More
Xeno RAT screenshot
Xeno RAT
xenorat
Xeno RAT is an open-source malware mainly distributed through drive-by downloads. The core capabilities of this threat include remote control, keystroke logging, webcam and microphone access. Equipped with advanced utilities, such as Hidden Virtual Network Computing and Socks5 reverse proxy, Xeno RAT is most frequently used in attacks against individual users.
Read More
Botnet screenshot
Botnet
botnet
A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.
Read More