top of page

Malware Attacks: Russian APT Targets Ukraine with BadPaw and MeowMeow

  • Mar 5
  • 2 min read

Key Findings


  • Researchers uncovered a Russian campaign targeting Ukrainian entities with new malware families BadPaw and MeowMeow delivered through phishing emails.

  • The attack chain begins with a phishing email carrying a link to a ZIP archive. When opened, an HTA file displays a Ukrainian-language lure about border crossing appeals while secretly launching the infection chain.

  • The malware uses the .NET Reactor packer to make analysis and reverse engineering harder, showing the attackers' intent to evade detection and maintain long-term persistence.

  • The malware includes multiple defense mechanisms, such as staying inactive unless launched with specific parameters and scanning for virtual machines and analysis tools to avoid detection.

  • The campaign has been attributed with moderate confidence to the Russian state-sponsored threat actor known as APT28.


Background


The attack chain initiates with a phishing email sent from the Ukrainian provider ukr[.]net, a service previously abused in Russian campaigns. The email contains a link that first loads a tracking pixel to notify the attackers when a victim clicks, then redirects to a shortened URL that downloads a ZIP archive. Inside the archive is a disguised HTA file posing as an HTML document.


Infection Chain


When executed, the HTA file opens a decoy document about a Ukrainian border-crossing appeal while silently launching the malicious routine. The HTA performs anti-analysis checks by verifying the system's installation date and aborting execution on recently installed systems, a common sandbox-evasion tactic.


If conditions are met, the HTA searches for the original archive, extracts additional components, and establishes persistence through a scheduled task. A VBS script then retrieves hidden payload data embedded within an image using steganography, extracting a PE file that researchers identified as the BadPaw loader, which ultimately deploys the MeowMeow backdoor and establishes command-and-control communication.


Malware Analysis


Both BadPaw and MeowMeow use the .NET Reactor packer to obfuscate the underlying code and hinder static analysis and reverse engineering. The MeowMeow backdoor also includes environmental checks, scanning systems for virtual machines and analysis tools, and stops execution if it detects a sandbox or research environment.


Threat Actor Attribution


Researchers at ClearSky attribute the campaign with moderate confidence to the Russian state-sponsored threat actor known as APT28, based on the targeting of Ukrainian entities, Russian-language artifacts in the code, and tactics consistent with previous Russian cyber operations, including multi-stage infection chains and .NET-based loaders.


Sources


  • https://securityaffairs.com/188974/apt/russian-apt-targets-ukraine-with-badpaw-and-meowmeow-malware.html

  • https://thehackernews.com/2026/03/apt28-linked-campaign-deploys-badpaw.html

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page