diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index c6a9be6..99e29ce 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -8833,7 +8833,20 @@ }, "uuid": "2dd31182-bae1-48ed-8bb3-805a3df89783", "value": "Gelsemium" + }, + { + "description": "Mentioned as operator of TriumphLoader and Matanbuchus", + "meta": { + "refs": [ + "https://unit42.paloaltonetworks.com/matanbuchus-malware-as-a-service/" + ], + "synonyms": [ + "Matanbuchus" + ] + }, + "uuid": "e7aff414-fc21-43eb-ad5d-9a46e07be9f5", + "value": "BelialDemon" } ], - "version": 204 + "version": 205 } diff --git a/clusters/tool.json b/clusters/tool.json index eaf3961..8874ee4 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -8292,7 +8292,21 @@ "related": [], "uuid": "d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7", "value": "RDAT" + }, + { + "description": "Matanbuchus is a loader promoted by BelialDemon. It can launch an EXE or DLL file in memory, leverage schtasks.exe to add or modify task schedules, and launch custom PowerShell commands, among other capabilities. Attackers use a Microsoft Excel document as the initial vector to drop the Matanbuchus Loader DLL.", + "meta": { + "date": "Feb 2021.", + "refs": [ + "https://unit42.paloaltonetworks.com/matanbuchus-malware-as-a-service/" + ], + "type": [ + "Loader" + ] + }, + "uuid": "2214b113-6942-494f-94b7-576e74fccdb5", + "value": "Matanbuchus" } ], - "version": 144 + "version": 145 }