How to uncover a Horabot campaign and detect this malware
This report details the discovery and analysis of a Horabot malware campaign targeting primarily Mexican users. The attack chain begins with a fake CAPTCHA page leading to multiple stages of obfuscated scripts, ultimately delivering an AutoIT loader and a Delphi-based banking Trojan. The malware employs sophisticated encryption techniques, anti-VM checks, and a custom protocol for C2 communication. It also includes a spreader component written in PowerShell that harvests and exfiltrates email addresses to distribute phishing emails. The analysis reveals Brazilian Portuguese comments in the code, suggesting the threat actor's origin. The report provides detection opportunities including YARA rules and hunting queries to identify this threat.
AI Analysis
Technical Summary
The Horabot campaign is a sophisticated multi-stage malware operation primarily targeting Mexican users. The infection begins with a fake CAPTCHA page designed to lure victims into executing obfuscated scripts. These scripts deliver an AutoIT loader, which subsequently loads a Delphi-based banking Trojan. The Trojan employs advanced encryption methods to protect its payload and communications, alongside anti-virtual machine (anti-VM) checks to evade sandbox detection. Command and control (C2) communications utilize a custom protocol, complicating network detection. Additionally, the malware includes a PowerShell-based spreader component that harvests email addresses from infected systems and exfiltrates them to facilitate phishing campaigns, increasing infection reach. The presence of Brazilian Portuguese comments in the codebase suggests the threat actor may be Brazilian or Portuguese-speaking, indicating regional origin or collaboration. The malware leverages multiple MITRE ATT&CK techniques such as credential dumping, process injection, persistence via registry run keys, obfuscated scripts, and network communication obfuscation. Detection strategies include deploying YARA rules tailored to the malware’s unique code signatures and hunting queries based on observed behaviors and indicators. No known public exploits are currently associated with this malware, indicating it relies on social engineering and phishing rather than zero-day vulnerabilities.
Potential Impact
The Horabot campaign poses significant risks to financial institutions and individual users in Mexico, potentially leading to theft of banking credentials and financial fraud. The multi-stage infection and sophisticated evasion techniques increase the likelihood of successful compromise and prolonged undetected presence within networks. The PowerShell spreader component amplifies the threat by enabling rapid internal propagation and external phishing campaigns, potentially affecting a broader user base. Organizations may suffer financial losses, reputational damage, and regulatory penalties due to data breaches and fraud. The campaign’s focus on email harvesting and phishing also increases the risk of secondary infections and wider distribution of malware. While currently focused on Mexico, the malware’s techniques could be adapted to target other regions, especially those with similar banking platforms or Portuguese/Spanish-speaking populations. The absence of known exploits suggests that user interaction and phishing remain the primary infection vectors, emphasizing the importance of user awareness and email security.
Mitigation Recommendations
Organizations should implement multi-layered defenses including advanced email filtering to detect and block phishing emails containing fake CAPTCHA pages or obfuscated scripts. Deploy endpoint detection and response (EDR) solutions capable of identifying AutoIT loaders, Delphi-based malware, and suspicious PowerShell activity. Utilize YARA rules and hunting queries provided in threat intelligence reports to proactively detect Horabot components. Enforce strict application whitelisting and restrict execution of AutoIT and PowerShell scripts unless explicitly authorized. Conduct regular user training focused on recognizing phishing attempts and suspicious web pages. Monitor network traffic for anomalies consistent with custom C2 protocols and encrypted communications. Implement anti-VM and sandbox evasion detection techniques to identify malware attempting to bypass analysis environments. Regularly audit and restrict registry run keys and persistence mechanisms. Finally, maintain up-to-date backups and incident response plans to quickly recover from infections and limit damage.
Affected Countries
Mexico, Brazil, United States, Spain, Portugal
Indicators of Compromise
- hash: 4caa797130b5f7116f11c0b48013e430
- hash: 6272ef6ac1de8fb4bdd4a760be7ba5ed
- hash: c882d948d44a65019df54b0b2996677f
- hash: b6144f80b32b37393b2da565326cd5085c6842e1
- hash: 474b25badb40f524a7b2fe089e51eb7dbafd2e3e03a9f6750f72055d05b13d76
- url: http://evs.grupotuis.buzz/0capcha17/DMEENLIGGB.hta
- url: https://aufal.filevexcasv.buzz/on7/index15.php
- url: https://aufal.filevexcasv.buzz/on7all/index15.php
- url: https://cfg.brasilinst.site/a/br/logs/index.php?CHLG
- url: https://cgf.facturastbs.shop/0725/a/home
- url: https://cgf.facturastbs.shop/a/08/150822/au/app
- url: https://cgf.facturastbs.shop/a/08/150822/au/at.html
- url: https://cgf.facturastbs.shop/a/08/150822/au/gerapdf/blqs1
- url: https://cgf.facturastbs.shop/a/08/150822/au/gerauto.php
- url: https://cgf.midasx.site/a/08/150822/au/au
- url: https://evs.grupotuis.buzz/0capcha17/
- url: https://evs.grupotuis.buzz/0capcha17/DMEENLIGGB.hta
- url: https://evs.grupotuis.buzz/0capcha17/DMEENLIGGB/GRXUOIWCEKVX
- url: https://labodeguitaup.space/a/08/150822/au/au
- url: https://pdj.gruposhac.lat/g1/
- url: https://pdj.gruposhac.lat/g1/auxld1
- url: https://pdj.gruposhac.lat/g1/ctld/
- url: https://pdj.gruposhac.lat/g1/gerador.php
- url: https://pdj.gruposhac.lat/g1/ld1/
- url: https://thea.gruposhac.space/0out0408
- url: https://upstar.pics/a/08/150822/up/up
- hash: e6a6e282a94c7724f5d9ac54d60d8cbd0e3ce892
- domain: labodeguitaup.space
- domain: lifenews.pro
- domain: upstar.pics
- domain: aufal.filevexcasv.buzz
- domain: cfg.brasilinst.site
- domain: cgf.facturastbs.shop
- domain: cgf.midasx.site
- domain: evs.grupotuis.buzz
- domain: pdj.gruposhac.lat
- domain: thea.gruposhac.space
How to uncover a Horabot campaign and detect this malware
Description
This report details the discovery and analysis of a Horabot malware campaign targeting primarily Mexican users. The attack chain begins with a fake CAPTCHA page leading to multiple stages of obfuscated scripts, ultimately delivering an AutoIT loader and a Delphi-based banking Trojan. The malware employs sophisticated encryption techniques, anti-VM checks, and a custom protocol for C2 communication. It also includes a spreader component written in PowerShell that harvests and exfiltrates email addresses to distribute phishing emails. The analysis reveals Brazilian Portuguese comments in the code, suggesting the threat actor's origin. The report provides detection opportunities including YARA rules and hunting queries to identify this threat.
AI-Powered Analysis
Technical Analysis
The Horabot campaign is a sophisticated multi-stage malware operation primarily targeting Mexican users. The infection begins with a fake CAPTCHA page designed to lure victims into executing obfuscated scripts. These scripts deliver an AutoIT loader, which subsequently loads a Delphi-based banking Trojan. The Trojan employs advanced encryption methods to protect its payload and communications, alongside anti-virtual machine (anti-VM) checks to evade sandbox detection. Command and control (C2) communications utilize a custom protocol, complicating network detection. Additionally, the malware includes a PowerShell-based spreader component that harvests email addresses from infected systems and exfiltrates them to facilitate phishing campaigns, increasing infection reach. The presence of Brazilian Portuguese comments in the codebase suggests the threat actor may be Brazilian or Portuguese-speaking, indicating regional origin or collaboration. The malware leverages multiple MITRE ATT&CK techniques such as credential dumping, process injection, persistence via registry run keys, obfuscated scripts, and network communication obfuscation. Detection strategies include deploying YARA rules tailored to the malware’s unique code signatures and hunting queries based on observed behaviors and indicators. No known public exploits are currently associated with this malware, indicating it relies on social engineering and phishing rather than zero-day vulnerabilities.
Potential Impact
The Horabot campaign poses significant risks to financial institutions and individual users in Mexico, potentially leading to theft of banking credentials and financial fraud. The multi-stage infection and sophisticated evasion techniques increase the likelihood of successful compromise and prolonged undetected presence within networks. The PowerShell spreader component amplifies the threat by enabling rapid internal propagation and external phishing campaigns, potentially affecting a broader user base. Organizations may suffer financial losses, reputational damage, and regulatory penalties due to data breaches and fraud. The campaign’s focus on email harvesting and phishing also increases the risk of secondary infections and wider distribution of malware. While currently focused on Mexico, the malware’s techniques could be adapted to target other regions, especially those with similar banking platforms or Portuguese/Spanish-speaking populations. The absence of known exploits suggests that user interaction and phishing remain the primary infection vectors, emphasizing the importance of user awareness and email security.
Mitigation Recommendations
Organizations should implement multi-layered defenses including advanced email filtering to detect and block phishing emails containing fake CAPTCHA pages or obfuscated scripts. Deploy endpoint detection and response (EDR) solutions capable of identifying AutoIT loaders, Delphi-based malware, and suspicious PowerShell activity. Utilize YARA rules and hunting queries provided in threat intelligence reports to proactively detect Horabot components. Enforce strict application whitelisting and restrict execution of AutoIT and PowerShell scripts unless explicitly authorized. Conduct regular user training focused on recognizing phishing attempts and suspicious web pages. Monitor network traffic for anomalies consistent with custom C2 protocols and encrypted communications. Implement anti-VM and sandbox evasion detection techniques to identify malware attempting to bypass analysis environments. Regularly audit and restrict registry run keys and persistence mechanisms. Finally, maintain up-to-date backups and incident response plans to quickly recover from infections and limit damage.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/horabot-campaign/119033/"]
- Adversary
- Horabot
- Pulse Id
- 69ba893ac080b945c5abb563
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash4caa797130b5f7116f11c0b48013e430 | — | |
hash6272ef6ac1de8fb4bdd4a760be7ba5ed | — | |
hashc882d948d44a65019df54b0b2996677f | — | |
hashb6144f80b32b37393b2da565326cd5085c6842e1 | — | |
hash474b25badb40f524a7b2fe089e51eb7dbafd2e3e03a9f6750f72055d05b13d76 | — | |
hashe6a6e282a94c7724f5d9ac54d60d8cbd0e3ce892 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://evs.grupotuis.buzz/0capcha17/DMEENLIGGB.hta | — | |
urlhttps://aufal.filevexcasv.buzz/on7/index15.php | — | |
urlhttps://aufal.filevexcasv.buzz/on7all/index15.php | — | |
urlhttps://cfg.brasilinst.site/a/br/logs/index.php?CHLG | — | |
urlhttps://cgf.facturastbs.shop/0725/a/home | — | |
urlhttps://cgf.facturastbs.shop/a/08/150822/au/app | — | |
urlhttps://cgf.facturastbs.shop/a/08/150822/au/at.html | — | |
urlhttps://cgf.facturastbs.shop/a/08/150822/au/gerapdf/blqs1 | — | |
urlhttps://cgf.facturastbs.shop/a/08/150822/au/gerauto.php | — | |
urlhttps://cgf.midasx.site/a/08/150822/au/au | — | |
urlhttps://evs.grupotuis.buzz/0capcha17/ | — | |
urlhttps://evs.grupotuis.buzz/0capcha17/DMEENLIGGB.hta | — | |
urlhttps://evs.grupotuis.buzz/0capcha17/DMEENLIGGB/GRXUOIWCEKVX | — | |
urlhttps://labodeguitaup.space/a/08/150822/au/au | — | |
urlhttps://pdj.gruposhac.lat/g1/ | — | |
urlhttps://pdj.gruposhac.lat/g1/auxld1 | — | |
urlhttps://pdj.gruposhac.lat/g1/ctld/ | — | |
urlhttps://pdj.gruposhac.lat/g1/gerador.php | — | |
urlhttps://pdj.gruposhac.lat/g1/ld1/ | — | |
urlhttps://thea.gruposhac.space/0out0408 | — | |
urlhttps://upstar.pics/a/08/150822/up/up | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainlabodeguitaup.space | — | |
domainlifenews.pro | — | |
domainupstar.pics | — | |
domainaufal.filevexcasv.buzz | — | |
domaincfg.brasilinst.site | — | |
domaincgf.facturastbs.shop | — | |
domaincgf.midasx.site | — | |
domainevs.grupotuis.buzz | — | |
domainpdj.gruposhac.lat | — | |
domainthea.gruposhac.space | — |
Threat ID: 69bad5f5771bdb1749b06b18
Added to database: 3/18/2026, 4:42:29 PM
Last enriched: 3/18/2026, 4:57:59 PM
Last updated: 3/19/2026, 6:10:12 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.