APT28 Targets Ukraine with New BadPaw and MeowMeow Malware in Sophisticated Cyber Campaign

Unveiling APT28’s Sophisticated Cyber Assault on Ukraine: The BadPaw and MeowMeow Malware Campaign

In a recent revelation, cybersecurity experts have uncovered a meticulously orchestrated cyber espionage campaign targeting Ukrainian entities. This operation, attributed with moderate confidence to the Russian state-sponsored group APT28, introduces two previously undocumented malware strains: BadPaw, a .NET-based loader, and MeowMeow, a sophisticated backdoor.

Initial Access and Infection Vector

The attack commences with a phishing email sent from a ukr[.]net domain, a tactic likely employed to establish credibility with the target. The email contains a link that, when clicked, redirects the recipient to a URL hosting a tracking pixel. This pixel serves as a notification mechanism, alerting the attackers that the link has been accessed. Subsequently, the victim is redirected to another URL to download a ZIP archive. This archive contains an HTML Application (HTA) file, which, upon execution, displays a decoy document written in Ukrainian concerning border crossing appeals. This document is designed to deceive the victim while the malicious payload is deployed in the background.

Evasion Techniques and Payload Deployment

The HTA file incorporates several evasion techniques to avoid detection and analysis. It checks the system’s installation date by querying the Windows Registry key KLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate. If the system was installed less than ten days prior, the malware aborts execution, a strategy aimed at evading sandbox environments and recently set up virtual machines.

If the system meets the criteria, the malware extracts two files from the ZIP archive: a Visual Basic Script (VBScript) and a PNG image. These files are saved to disk under different names. A scheduled task is then created to execute the VBScript, ensuring persistence on the infected system. The VBScript’s primary function is to extract malicious code embedded within the PNG image, a technique known as steganography. This extracted code is the BadPaw loader, which establishes communication with a command-and-control (C2) server to download additional components, including the MeowMeow backdoor.

MeowMeow Backdoor Capabilities

The MeowMeow backdoor is designed to execute remote PowerShell commands and perform file system operations such as reading, writing, and deleting data. To evade detection, it incorporates multiple layers of defense mechanisms, including runtime parameter requirements, obfuscation using the .NET Reactor packer, sandbox detection, and monitoring for forensic tools like Wireshark, Procmon, Ollydbg, and Fiddler. If executed without the specific parameter -v or in an analysis environment, the backdoor displays a benign graphical user interface featuring a cat image. Clicking the MeowMeow button within this interface results in a harmless Meow Meow Meow message, serving as a decoy to mislead analysts.

Attribution and Implications

The presence of Russian-language strings within the source code of the malware suggests that the developers are Russian-speaking. This, combined with the targeting of Ukrainian entities and the use of sophisticated evasion techniques, leads researchers to attribute the campaign to APT28 with moderate confidence. APT28, also known as Fancy Bear, is a well-known Russian state-sponsored threat actor with a history of conducting cyber espionage operations against various geopolitical targets.

This campaign underscores the evolving tactics of state-sponsored threat actors and highlights the importance of robust cybersecurity measures. Organizations, especially those in geopolitically sensitive regions, must remain vigilant against such sophisticated threats. Implementing comprehensive security protocols, conducting regular employee training on phishing awareness, and maintaining up-to-date systems are crucial steps in mitigating the risk posed by such advanced persistent threats.