Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
176
Global rank
180 infographic chevron month
Month rank
175 infographic chevron week
Week rank
0
IOCs

Caminho Loader is a Brazilian-origin Loader-as-a-Service operation that uses steganography to conceal .NET payloads within image files hosted on legitimate platforms. Active since March 2025, it has delivered a variety of malware and infostealers to victims within multiple industries across South America, Africa, and Eastern Europe.

Loader
Type
Unknown
Origin
1 March, 2025
First seen
9 February, 2026
Last seen

How to analyze Caminho Loader with ANY.RUN

Type
Unknown
Origin
1 March, 2025
First seen
9 February, 2026
Last seen

IOCs

IP addresses
181.206.158.190
191.93.118.254
198.46.173.60
Last Seen at

Recent blog posts

post image
Building Phishing Detection That Works: 3 Ste...
watchers 374
comments 0
post image
ClickFix Meets AI: A Multi-Platform Attack Ta...
watchers 2362
comments 0
post image
From Reactive to Proactive: 5 Steps to SOC Ma...
watchers 4615
comments 0

Caminho Loader: LSB Steganography Meets Loader-as-a-Service

Key Takeaways

  1. Caminho hides malicious .NET payloads inside innocent-looking images using Least Significant Bit steganography, making detection extremely challenging for traditional security controls.

  2. The malware loads and executes entirely in memory without writing files to disk, defeating file-based antivirus scanning and leaving minimal forensic artifacts.

  3. Caminho operates as a commercial service where multiple cybercriminal customers rent access to the delivery infrastructure while providing their own final payloads including REMCOS RAT, XWorm, and Katz Stealer.

  4. The operation exploits trusted services like archive.org for hosting steganographic images and Pastebin services for script staging, evading reputation-based security controls.

56 Active since March 2025 with confirmed victims in Brazil, South Africa, Ukraine, and Poland, demonstrating rapid geographic expansion beyond initial South American targeting.

  1. Use Threat Intelligence Lookup to determine if Caminho Loader is threatening your organization right now: see what countries and industries are being targeted, check potential IOCs:

threatName:"caminholoader" or threatName:"caminho".

Caminho Loader overview in TI Lookup Search for malware’s name to see active campaigns and fresh samples

  1. ANY.RUN's Interactive Sandbox provides critical visibility into Caminho's multi-stage execution, allowing security teams to observe steganographic extraction, memory-resident execution, and final payload delivery in real-time — capabilities that static analysis cannot provide.

View analysis

Caminho Loader malware analysis in Interactive Sandbox Caminho Loader malware analysis

What is Caminho Loader Malware?

Caminho Loader is a sophisticated Brazilian-origin Loader-as-a-Service (LaaS) malware, active since March 2025. It employs Least Significant Bit (LSB) steganography to conceal .NET payloads within innocuous image files, enabling fileless execution and delivery of various remote access trojans (RATs) and stealers like REMCOS, XWorm, and DCRAT.

Caminho, which means "path" in Portuguese, represents a significant evolution in malware delivery techniques. The PowerShell next extracts a concealed .NET Loader from the image using LSB steganography, loads it directly into memory, and invokes it with arguments specifying the final payload URL. What makes Caminho particularly dangerous is its fileless execution model that bypasses disk-based detection systems.

Analysis of 71 Caminho Loader samples reveals consistent architectural patterns despite varying obfuscation, with all samples containing Portuguese-language strings and the distinctive HackForums[.]gigajew namespace artifact. The loader implements extensive anti-analysis measures including virtual machine detection, sandbox identification, and debugging tool recognition, making it extremely difficult for security researchers to analyze.

The malware operates as a Loader-as-a-Service business model, meaning multiple cybercriminal customers can rent access to the delivery infrastructure while supplying their own final payloads. The standardized invocation interface accepts arbitrary payload URLs as arguments, allowing multiple customers to deploy different malware families using the same delivery infrastructure. This modular architecture explains why the same steganographic images appear across multiple campaigns delivering entirely different malware families.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Caminho Loader Victimology

Caminho primarily targets organizations in South America (especially Brazil), Africa (e.g., South Africa), and Eastern Europe (Ukraine, Poland). One notable campaign by the BlindEagle APT group (also known as APT-C-54) targeted a Colombian government agency under the Ministry of Commerce, Industry, and Tourism in September 2025. Victims span various industries, lured by business-themed phishing emails (invoices, quotations). Attacks are opportunistic rather than highly targeted at specific sectors, focusing on entities where users are likely to open attachments or links.

How Caminho Loader Infiltrates and Functions

The multi-stage infection chain begins with spear-phishing emails containing archived JavaScript (JS) or VBScript files using business-themed social engineering lures. The attackers craft convincing emails impersonating legitimate business communications, with compressed RAR or ZIP archives attached.

The archives use file names that are socially engineered to entice victims to open them. A fake invoice is one of the most common formats used for phishing, because the recipient's concern of missing a financial payment or being required to make one invokes a sense of urgency. Other common lures include quotation requests, business proposals, and shipping notifications.

When victims open these attachments and execute the JavaScript or VBScript file, the initial script contacts Pastebin-style services like paste.ee or pastefy.app to retrieve obfuscated PowerShell code. These legitimate pasting services provide free hosting and are difficult to block without disrupting legitimate business operations.

The PowerShell payload then downloads seemingly innocent images from trusted platforms like archive.org. Because these platforms enjoy high reputation scores and are used for legitimate purposes, security systems typically allow these downloads without raising alerts.

The PowerShell script then performs the steganographic extraction, loading the hidden Caminho Loader directly into memory. The loader subsequently reaches out to attacker-controlled infrastructure to download the final payload — REMCOS RAT, XWorm, Katz Stealer, or another malware family depending on the customer's choice.

Lateral movement and spreading depend on the final payload deployed. Remote access trojans like REMCOS and XWorm enable attackers to manually spread through networks by stealing credentials, mapping network resources, and deploying additional malware to other systems. However, Caminho Loader itself does not include self-propagation or worm-like spreading mechanisms.

Sandbox Analyses of Caminho Loader Samples

ANY.RUN’s Interactive Sandbox overcomes Caminho’s ant-detection and sandbox-evasion mechanics, exposing the full attack chain.

View a Caminho Loader sample analysis

Caminho Loader sandbox analysis Caminho Loader dissected in the Interactive Sandbox

The loader is a JavaScript script that uses several obfuscation techniques. Based on the tracer output, the following conclusion can be drawn:

The script initializes tools for file and network operations, determines its own current path, pauses for 5 seconds, and then silently launches a hidden PowerShell instance. After that, it prepares to download or process data from the internet.

Malicious script launching a PowerShell process Malicious script launching a PowerShell process

When the Base64 is decoded, it becomes clear that PowerShell downloads content from an image file hosted on archive.org, locates embedded Base64 data within it, converts that data into an executable program directly in memory, and then invokes a specific function with additional encrypted parameters and references to folders and files on the disk.

Loader retrieves its functionality from a web archive picture Loader retrieves its functionality from a web archive picture

In this sample analysis, the malicious payload has not been delivered. View another sandbox session to see how this might happen:

View another Caminho Loader analysis

As a result of the loader’s activity, we observe AsyncRAT injected into the AddInProcess32 process.

Caminho Loader delivers payload: AsyncRAT Caminho Loader delivers payload: AsyncRAT trojan

Gathering Threat Intelligence on Caminho Loader Malware

ANY.RUN's Threat Intelligence Lookup gives security teams instant access to a vast database of analyzed malware samples. Businesses can quickly search for Caminho-related hashes, domains, IPs, explore YARA/Sigma rules. This enables rapid blocking of indicators, enrichment of detection rules, and proactive threat hunting — helping organizations stop steganographic loaders and similar fileless threats before they cause damage.

Use TI Lookup to explore fresh Caminho samples analyzed in the Sandbox by a community of over 600K ANY.RUN’s users:

threatName:"caminholoader" or threatName:"caminho".

Caminho Loader sandbox analyses

Caminho Loader sandbox analyses

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Caminho Loader exemplifies modern malware evolution: blending steganography, fileless execution, and a service-based model to evade defenses. Originating from Brazil but impacting global victims, it underscores the need for layered security, user awareness, and advanced analysis tools to counter such stealthy threats.

Trial TI Lookup to start gathering actionable threat intelligence on the malware that threatens your business sector and region: just sign up to ANY.RUN.

HAVE A LOOK AT

DragonForce screenshot
DragonForce
dragonforce
DragonForce is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model. First reported in December 2023, it encrypts files with ChaCha8, renames them with random strings, and appends “.dragonforce_encrypted.” By disabling backups, wiping recovery, and spreading across SMB shares, DragonForce maximizes damage and pressures victims into multimillion-dollar ransom negotiations. It has targeted manufacturing, construction, IT, healthcare, and retail sectors worldwide, making it a severe threat to modern enterprises.
Read More
Black Basta screenshot
Black Basta
blackbasta
Black Basta is a ransomware-as-a-service operated by Storm-1811. It emerged in 2022 and uses double extortion tactics, encrypting data and stealing it for ransom. The malware often gains access through spear-phishing and uses tools like QakBot and Cobalt Strike. It's known for exploiting system vulnerabilities and using advanced obfuscation techniques.
Read More
Trojan screenshot
Trojan
trojan trojan horse
Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.
Read More
GREENBLOOD screenshot
GREENBLOOD
greenblood
GREENBLOOD is a Go-based ransomware that uses concurrent ChaCha8 encryption to lock entire Windows environments in under a minute while systematically destroying backups, disabling defenses, and threatening double extortion through a Tor-based data leak site.
Read More
Lynx screenshot
Lynx
lynx
Lynx is a double extortion ransomware: attackers encrypt important and sensitive data and demand a ransom for decryption simultaneously threatening to publish or sell the data. Active since mid-2024. Among techniques are terminating processes and services, privilege escalation, deleting shadow copies. Distribution by phishing, malvertising, exploiting vulnerabilities.
Read More
Sality screenshot
Sality
sality
Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions.
Read More