top of page

APT28’s “MeowMeow” Campaign Targets Ukraine with BadPaw Loader

  • Foto del escritor: Javier  Conejo del Cerro
    Javier Conejo del Cerro
  • hace 1 día
  • 4 Min. de lectura

A new cyber-espionage campaign targeting Ukrainian organizations has been uncovered, involving two previously undocumented malware families: BadPaw and MeowMeow. Researchers attribute the operation with moderate confidence to the Russian state-linked group APT28.

The campaign relies on carefully staged phishing, multi-layered loaders, and stealth techniques designed to evade analysis environments. By combining deceptive documents, sandbox checks, hidden payloads inside images, and modular malware delivery, the attackers establish persistent access and remote control over compromised systems.


Phase 1: Phishing & Target Validation 


The attack begins with a phishing email sent from ukr[.]net, a legitimate Ukrainian email service used to increase credibility.

Inside the email is a link that appears to lead to a ZIP archive. However, before the victim even downloads anything, the link first loads a very small image acting as a tracking pixel.

This tracking pixel serves a strategic purpose:

  • It confirms to the attacker that the target clicked the link.

  • Only after this confirmation does the victim get redirected to a second URL that delivers the malicious archive.

This step allows the operators to verify engagement before deploying the malware, improving operational efficiency and reducing unnecessary exposure.


Phase 2: Decoy Documents & Environment Checks 


Once the ZIP archive is downloaded and extracted, the victim launches an HTA (HTML Application) file.

The HTA performs two simultaneous actions:

  1. Displays a decoy document to the victim

  2. Executes malicious activity in the background

The displayed document contains a Ukrainian-language message confirming receipt of a government appeal related to border crossing procedures.

This geopolitical lure is specifically crafted to match the Ukrainian context and maintain the illusion of legitimacy.

At the same time, the malware performs sandbox-evasion checks. It queries the Windows registry key:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate

This value reveals when Windows was installed.

If the system appears too new (less than 10 days old), the malware assumes it may be running inside an analysis sandbox and terminates execution.


Phase 3: Payload Extraction & Persistence

 

If the environment appears legitimate, the attack proceeds.

The HTA locates the downloaded archive and extracts two files:

  • A VBScript

  • A PNG image

Both are saved under new names on the victim’s system.

The malware then establishes persistence by creating a scheduled task, ensuring the malicious script runs automatically.

The VBScript’s primary role is to extract hidden malware embedded inside the PNG image.

This technique allows attackers to hide executable code inside what appears to be a harmless image file, bypassing many traditional detection methods.


Phase 4: BadPaw Loader Deployment 


The code extracted from the PNG image is an obfuscated .NET loader called BadPaw.

BadPaw acts as a stage-two loader, responsible for:

  • Contacting a remote command-and-control (C2) server

  • Downloading additional components

  • Launching the next stage of the attack

One of the downloaded payloads is a backdoor executable named MeowMeow.

BadPaw also includes deception mechanisms. If executed outside the full infection chain, it runs dummy code displaying a graphical interface with a cat image.

Clicking the “MeowMeow” button simply displays the message:

Meow Meow Meow

This fake interface is designed to mislead analysts during manual investigation.


Phase 5: MeowMeow Backdoor Activation 


The final payload, MeowMeow, becomes active only under very specific conditions.

First, it must be launched with a command-line parameter:

-v

This parameter is provided by the earlier stages of the infection chain.

Second, the malware checks for analysis tools, including:

  • Wireshark

  • Procmon

  • Ollydbg

  • Fiddler

If any of these tools are detected, the malware stops execution.

When the environment appears safe, MeowMeow activates its backdoor functionality.

Capabilities include:

  • Remote PowerShell command execution

  • File system operations (read, write, delete)

  • System interaction via attacker commands

  • Potential file access and data exfiltration

These capabilities give the operators full remote control over compromised systems.


Attribution to APT28


Researchers attribute the campaign with moderate confidence to the Russian state-linked group APT28.


This assessment is based on:


  • Targeting patterns focused on Ukrainian organizations

  • The geopolitical lure themes

  • Overlaps with previous Russian cyber-espionage tradecraft

  • Russian-language strings found within the malware source code


The presence of Russian text in the code suggests either:


  • An operational security mistake by the developers, or

  • Development artifacts left during malware compilation.


Organizations can reduce exposure to this type of campaign by implementing the following controls:


  • Block or quarantine ZIP archives delivered via phishing emails

  • Detect and restrict HTA execution

  • Monitor for suspicious VBScript activity

  • Inspect image files for embedded payloads or abnormal behavior

  • Monitor creation of scheduled tasks linked to unknown scripts

  • Deploy EDR detection for PowerShell abuse

  • Detect outbound traffic to suspicious C2 infrastructure

  • Monitor registry queries related to InstallDate sandbox checks

  • Detect unusual script activity extracting code from PNG images


The BadPaw–MeowMeow campaign highlights how modern espionage malware increasingly blends social engineering, evasion tactics, and modular loaders.

Rather than relying on single-stage payloads, attackers now build layered infection chains that include tracking pixels, environment checks, decoy documents, hidden payload carriers, and conditional backdoor activation.


The use of images to conceal malware, sandbox-aware logic, and staged loaders demonstrates the sophistication of the operation and its focus on long-term covert access rather than rapid disruption.

For defenders, this campaign reinforces a key lesson: detecting modern threats requires monitoring behavioral patterns across multiple stages, not just identifying malicious files.



The Hacker News


 
 
 

Comentarios


bottom of page