Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

How to uncover a Horabot campaign and detect this malware

0
Medium
Published: Wed Mar 18 2026 (03/18/2026, 11:15:06 UTC)
Source: AlienVault OTX General

Description

This report details the discovery and analysis of a Horabot malware campaign targeting primarily Mexican users. The attack chain begins with a fake CAPTCHA page leading to multiple stages of obfuscated scripts, ultimately delivering an AutoIT loader and a Delphi-based banking Trojan. The malware employs sophisticated encryption techniques, anti-VM checks, and a custom protocol for C2 communication. It also includes a spreader component written in PowerShell that harvests and exfiltrates email addresses to distribute phishing emails. The analysis reveals Brazilian Portuguese comments in the code, suggesting the threat actor's origin. The report provides detection opportunities including YARA rules and hunting queries to identify this threat.

AI-Powered Analysis

AILast updated: 03/18/2026, 16:57:59 UTC

Technical Analysis

The Horabot campaign is a sophisticated multi-stage malware operation primarily targeting Mexican users. The infection begins with a fake CAPTCHA page designed to lure victims into executing obfuscated scripts. These scripts deliver an AutoIT loader, which subsequently loads a Delphi-based banking Trojan. The Trojan employs advanced encryption methods to protect its payload and communications, alongside anti-virtual machine (anti-VM) checks to evade sandbox detection. Command and control (C2) communications utilize a custom protocol, complicating network detection. Additionally, the malware includes a PowerShell-based spreader component that harvests email addresses from infected systems and exfiltrates them to facilitate phishing campaigns, increasing infection reach. The presence of Brazilian Portuguese comments in the codebase suggests the threat actor may be Brazilian or Portuguese-speaking, indicating regional origin or collaboration. The malware leverages multiple MITRE ATT&CK techniques such as credential dumping, process injection, persistence via registry run keys, obfuscated scripts, and network communication obfuscation. Detection strategies include deploying YARA rules tailored to the malware’s unique code signatures and hunting queries based on observed behaviors and indicators. No known public exploits are currently associated with this malware, indicating it relies on social engineering and phishing rather than zero-day vulnerabilities.

Potential Impact

The Horabot campaign poses significant risks to financial institutions and individual users in Mexico, potentially leading to theft of banking credentials and financial fraud. The multi-stage infection and sophisticated evasion techniques increase the likelihood of successful compromise and prolonged undetected presence within networks. The PowerShell spreader component amplifies the threat by enabling rapid internal propagation and external phishing campaigns, potentially affecting a broader user base. Organizations may suffer financial losses, reputational damage, and regulatory penalties due to data breaches and fraud. The campaign’s focus on email harvesting and phishing also increases the risk of secondary infections and wider distribution of malware. While currently focused on Mexico, the malware’s techniques could be adapted to target other regions, especially those with similar banking platforms or Portuguese/Spanish-speaking populations. The absence of known exploits suggests that user interaction and phishing remain the primary infection vectors, emphasizing the importance of user awareness and email security.

Mitigation Recommendations

Organizations should implement multi-layered defenses including advanced email filtering to detect and block phishing emails containing fake CAPTCHA pages or obfuscated scripts. Deploy endpoint detection and response (EDR) solutions capable of identifying AutoIT loaders, Delphi-based malware, and suspicious PowerShell activity. Utilize YARA rules and hunting queries provided in threat intelligence reports to proactively detect Horabot components. Enforce strict application whitelisting and restrict execution of AutoIT and PowerShell scripts unless explicitly authorized. Conduct regular user training focused on recognizing phishing attempts and suspicious web pages. Monitor network traffic for anomalies consistent with custom C2 protocols and encrypted communications. Implement anti-VM and sandbox evasion detection techniques to identify malware attempting to bypass analysis environments. Regularly audit and restrict registry run keys and persistence mechanisms. Finally, maintain up-to-date backups and incident response plans to quickly recover from infections and limit damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/horabot-campaign/119033/"]
Adversary
Horabot
Pulse Id
69ba893ac080b945c5abb563
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash4caa797130b5f7116f11c0b48013e430
hash6272ef6ac1de8fb4bdd4a760be7ba5ed
hashc882d948d44a65019df54b0b2996677f
hashb6144f80b32b37393b2da565326cd5085c6842e1
hash474b25badb40f524a7b2fe089e51eb7dbafd2e3e03a9f6750f72055d05b13d76
hashe6a6e282a94c7724f5d9ac54d60d8cbd0e3ce892

Url

ValueDescriptionCopy
urlhttp://evs.grupotuis.buzz/0capcha17/DMEENLIGGB.hta
urlhttps://aufal.filevexcasv.buzz/on7/index15.php
urlhttps://aufal.filevexcasv.buzz/on7all/index15.php
urlhttps://cfg.brasilinst.site/a/br/logs/index.php?CHLG
urlhttps://cgf.facturastbs.shop/0725/a/home
urlhttps://cgf.facturastbs.shop/a/08/150822/au/app
urlhttps://cgf.facturastbs.shop/a/08/150822/au/at.html
urlhttps://cgf.facturastbs.shop/a/08/150822/au/gerapdf/blqs1
urlhttps://cgf.facturastbs.shop/a/08/150822/au/gerauto.php
urlhttps://cgf.midasx.site/a/08/150822/au/au
urlhttps://evs.grupotuis.buzz/0capcha17/
urlhttps://evs.grupotuis.buzz/0capcha17/DMEENLIGGB.hta
urlhttps://evs.grupotuis.buzz/0capcha17/DMEENLIGGB/GRXUOIWCEKVX
urlhttps://labodeguitaup.space/a/08/150822/au/au
urlhttps://pdj.gruposhac.lat/g1/
urlhttps://pdj.gruposhac.lat/g1/auxld1
urlhttps://pdj.gruposhac.lat/g1/ctld/
urlhttps://pdj.gruposhac.lat/g1/gerador.php
urlhttps://pdj.gruposhac.lat/g1/ld1/
urlhttps://thea.gruposhac.space/0out0408
urlhttps://upstar.pics/a/08/150822/up/up

Domain

ValueDescriptionCopy
domainlabodeguitaup.space
domainlifenews.pro
domainupstar.pics
domainaufal.filevexcasv.buzz
domaincfg.brasilinst.site
domaincgf.facturastbs.shop
domaincgf.midasx.site
domainevs.grupotuis.buzz
domainpdj.gruposhac.lat
domainthea.gruposhac.space

Threat ID: 69bad5f5771bdb1749b06b18

Added to database: 3/18/2026, 4:42:29 PM

Last enriched: 3/18/2026, 4:57:59 PM

Last updated: 3/19/2026, 6:10:12 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses