Weaponized HTML Files Deploy Horabot Malware in Latin America

A sophisticated phishing campaign has been targeting Spanish-speaking users in Latin America, utilizing weaponized HTML files to distribute the Horabot malware. This malware combines credential theft, email automation, and banking Trojan capabilities, posing significant risks to both corporate and personal networks.

Initial Attack Vector: Phishing Emails

The attack begins with phishing emails disguised as financial invoices, often titled Factura Adjunta (Attached Invoice). These emails contain ZIP attachments housing malicious HTML files. When a recipient opens the HTML file, it decodes an embedded Base64 URL, redirecting the user to a JavaScript-driven download page. This page automatically downloads a second ZIP archive containing a heavily obfuscated HTA (HTML Application) file.

Multi-Stage Payload Delivery

Upon execution, the HTA file initiates a series of scripts designed to deploy the Horabot malware. The malware leverages Outlook COM objects to hijack the victim’s email client, enabling it to send phishing messages to the victim’s contacts and propagate laterally within networks. This method of distribution increases the malware’s reach and effectiveness.

Evasion Techniques and Persistence

Horabot employs several evasion techniques to avoid detection:

– Obfuscation: The malware uses mathematical transformations within custom VBScript to decode hidden strings, such as command-and-control (C2) server URLs and PowerShell commands, during execution.

– Environment Checks: It queries system information to detect virtualization environments like VirtualBox, VMware, or Hyper-V. If such environments are detected, the malware terminates its execution to evade sandbox analysis.

– Antivirus Detection: Horabot checks for the presence of Avast Antivirus by verifying specific directories. If found, it halts execution to avoid detection.

– Persistence Mechanisms: The malware establishes persistence by creating hidden files in system directories, modifying file attributes to hidden, system, and read-only, and scheduling tasks via PowerShell to ensure it remains active on the infected system.

Final Payload: Banking Trojan

In its final stage, Horabot injects a banking Trojan designed to overlay fake login forms on legitimate banking websites. This allows the malware to capture sensitive credentials, including login information and one-time security codes, facilitating unauthorized access to victims’ financial accounts.

Implications and Recommendations

The Horabot campaign exemplifies the increasing sophistication of phishing attacks, combining social engineering with technical obfuscation to compromise systems. Its reliance on trusted tools like Outlook and PowerShell complicates detection, underscoring the need for proactive defense strategies.

Recommendations for Mitigation:

1. User Education: Train employees and individuals to recognize phishing emails, especially those with unexpected attachments or links.

2. Email Filtering: Implement advanced email filtering solutions to detect and block malicious attachments and links.

3. Endpoint Protection: Deploy comprehensive endpoint protection solutions capable of detecting and mitigating malware that uses obfuscation and evasion techniques.

4. Regular Updates: Ensure all systems and software are regularly updated to patch vulnerabilities that could be exploited by malware.

5. Network Monitoring: Monitor network traffic for unusual activity that may indicate malware communication with C2 servers.

By adopting these measures, organizations and individuals can enhance their defenses against sophisticated malware campaigns like Horabot.