BadPaw and MeowMeow: steganographic .NET malware hits Ukrainian targets

A ClearSky report details a new loader and backdoor pair, and Scythe shows how to operationalise it as continuous adversary emulation.

APT28, Ukraine, phishing, steganography, .NET malware, adversary emulation, Windows

Affected vendor / product: Microsoft Windows endpoints
Primary issue: Spearphishing-delivered, parameter-gated .NET loader (BadPaw) deploying a backdoor (MeowMeow)
Exploitation status: Observed in the wild (phishing campaign) (ClearSky Cyber Security)
Confidence level: Russia state-aligned actor (High); APT28 attribution (Low) (ClearSky Cyber Security)
Sectors at risk: Government, energy (Ukraine-centric targeting reported) (Scythe)
Regions at risk: Ukraine (primary), adjacent regional organisations with Ukraine-facing operations (Possible)

Executive Summary

ClearSky has documented an active phishing campaign targeting Ukrainian entities and delivering two previously undocumented malware strains: BadPaw (a .NET loader) and MeowMeow (a backdoor). (ClearSky Cyber Security) The chain blends social engineering with multiple layers of defensive tradecraft, including strict runtime parameter checks, sandbox evasion via system “age” checks, and steganographic payload extraction from a PNG. (ClearSky Cyber Security)

Attribution is deliberately cautious: ClearSky assesses high confidence that the campaign is Russia state-aligned, but only low confidence that it is specifically APT28. (ClearSky Cyber Security) Open-source reporting has described the activity as “APT28-linked”, but this is not uniformly supported at high confidence by the primary report. (The Hacker News)

Separately, Scythe has published a practitioner-focused walkthrough showing how to translate ClearSky’s reporting into repeatable adversary emulation for ongoing control validation, rather than a one-off lab exercise. (Scythe)

Context

ClearSky states the initial artefact was identified following an upload from Ukraine to a public database, and notes the use of ukr[.]net addresses as a credibility play against Ukrainian recipients. (ClearSky Cyber Security) The lure theme centres on Ukrainian border crossing appeals and related “official” documentation, supported by decoy content opened during execution. (ClearSky Cyber Security)

ClearSky’s attribution rationale combines victimology (Ukraine-focused), Russian-language artefacts in code, and tradecraft overlap with previous Russian operations. However, it explicitly labels APT28 attribution as low confidence. (ClearSky Cyber Security)

Technical Analysis

Infection chain

1) Phishing with click-tracking and download redirection
The phishing email includes a link that triggers two actions: a redirect to a tracking pixel hosted on infotrackerstatistic[.]live (to signal link clicks), and a redirect via a cutt[.]ly short URL to deliver the ZIP archive. (ClearSky Cyber Security)

2) HTA masquerading as HTML plus sandbox evasion
The retrieved ZIP contains a file presented with an .html extension, but analysis shows it is an HTA (HTML Application). (ClearSky Cyber Security) During execution it drops and opens a decoy document, then performs an environment check by reading HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate and terminating if the OS appears freshly installed (under ten days). (ClearSky Cyber Security)

3) Secondary stage extraction, persistence, and steganography
After locating the original ZIP (named “Звернення_156”), the malware extracts a VBS and a PNG (ClearSky shows the PNG as CAT.png and the script as LibHelperDemo.vbs), then saves them under different names and locations. ClearSky’s screenshots show mshta.exe writing the renamed artefacts into an UpdateHelpers directory under the user profile, and a scheduled task being created to execute the VBS for persistence.

The VBS parses the PNG and extracts a PE payload hidden after a <STEGO_START> marker, consistent with steganographic staging. (ClearSky Cyber Security) ClearSky names the extracted loader “BadPaw”. (ClearSky Cyber Security)

BadPaw loader behaviour

BadPaw is a .NET loader obfuscated with .NET Reactor. (ClearSky Cyber Security) ClearSky reports that if executed outside the intended chain it presents a benign decoy GUI (“Regex Finder”), with malicious logic only triggered when launched with the -renew parameter. (ClearSky Cyber Security)

When properly triggered, BadPaw communicates with virtualdailyplanner[.]pro and uses multiple endpoints (including /getcalendar, /eventmanager, and /planneractivate) in a staged fashion to retrieve additional content. (ClearSky Cyber Security)

MeowMeow backdoor behaviour

ClearSky describes MeowMeow as a persistent backdoor dropped later in the chain (shown as MeowMeowProgram.exe). (ClearSky Cyber Security) As with BadPaw, it includes a decoy mode when executed standalone (a cat-themed GUI), and requires a specific runtime parameter (-v) to activate malicious functionality. (ClearSky Cyber Security)

ClearSky reports multiple defensive layers: .NET Reactor obfuscation, checks for sandbox and virtualised environments, and continuous monitoring for analysis tools such as Wireshark, Procmon, Ollydbg, and Fiddler, terminating if found. (ClearSky Cyber Security) Reported core capabilities include remote PowerShell execution and file system operations (read, write, delete). (The Hacker News)

Threat actor assessment

Confirmed: ClearSky assesses the campaign as Russia state-aligned with high confidence. (ClearSky Cyber Security)
Likely: Some open-source reporting describes the activity as APT28-linked, citing the use of ukr[.]net addresses and tradecraft overlap. (The Hacker News)
Confidence note: ClearSky’s own APT28 attribution is low confidence, and victim identities and operational outcomes are not publicly detailed. (ClearSky Cyber Security)

For background on APT28’s widely reported profile and aliases, refer to MITRE’s APT28 entry. (MITRE ATT&CK)

MITRE ATT&CK mapping

TacticTechnique IDTechnique nameObserved behaviour
Initial AccessT1566.002 (MITRE ATT&CK)Spearphishing LinkEmail-delivered link redirects to tracking pixel and download chain
Execution / Defence EvasionT1218.005 (MITRE ATT&CK)MshtaHTA execution and staging shown involving mshta.exe
Defence EvasionT1497.001 (MITRE ATT&CK)System ChecksReads OS install date to evade sandboxes
Defence EvasionT1027.003 (MITRE ATT&CK)SteganographyExtracts PE payload hidden in PNG after <STEGO_START>
Defence EvasionT1027.002 (MITRE ATT&CK)Software PackingBadPaw and MeowMeow obfuscated with .NET Reactor (ClearSky Cyber Security)
PersistenceT1053.005 (MITRE ATT&CK)Scheduled TaskScheduled task created to run VBS stage (ClearSky Cyber Security)
Command and ControlT1071.001 (MITRE ATT&CK)Web ProtocolsHTTPS C2 to virtualdailyplanner[.]pro endpoints
ExecutionT1059.001 (MITRE ATT&CK)PowerShellBackdoor supports remote PowerShell command execution (ClearSky Cyber Security)

Indicators of Compromise

TypeValueContext / NotesSourceConfidence
Email senderlviv_zagin_dpsu[@]ukr[.]netReported sender address used in the lureClearSky report (March 2026)Confirmed
URL (tracking)https[://]infotrackerstatistic[.]live/open?token=…Tracking pixel to confirm link clicksClearSky report (ClearSky Cyber Security)Confirmed
URL shortenerhttps[://]cutt[.]ly/0tnHM0nhRedirect to final ZIP downloadClearSky report (ClearSky Cyber Security)Confirmed
Domain (C2)virtualdailyplanner[.]proBadPaw C2 domainClearSky report (ClearSky Cyber Security)Confirmed
URL paths/getcalendar; /eventmanager; /planneractivateStaged retrieval and activation flowClearSky report (ClearSky Cyber Security)Confirmed
File hash (likely initial email artefact)SHA-256: 160e40a763dfb518dc6929c2d7838d3f9eafab09eab1e8d0b00c69f6b73d681bListed in report footnote associated with the identified email fileClearSky report (ClearSky Cyber Security)Confirmed (context limited)
File hash (BadPaw)SHA-256: 6cad470e10c09151b5d337a082a088cfe25d697ef295e02759e1e68e8b3bbbcbBadPaw payload extracted from PNGClearSky reportConfirmed
File pathC:\Users\admin\AppData\Local\UpdateHelpers\UpdateHelper.vbsRenamed VBS stage written by mshta.exeClearSky report (screenshot)Confirmed
File pathC:\Users\admin\AppData\Local\UpdateHelpers\HelperLogo.pngRenamed PNG carrier written by mshta.exeClearSky report (screenshot)Confirmed
Dropped fileC:\Users\Public\Libraries\config.library-msContains configuration data retrieved from C2ClearSky report (screenshot)Confirmed
Dropped fileC:\Users\admin\Pictures\WallpapperSet.jpgContains ASCII code retrieved from /eventmanagerClearSky report (screenshot)Confirmed
Dropped fileC:\Users\admin\AppData\Local\MeowCheck\MeowMeowProgram.exeMeowMeow backdoorClearSky report (screenshot)Confirmed

Incident Response Guidance

Triage and scoping

  • Hunt for mshta.exe executions that originate from user download locations and immediately create VBS/PNG artefacts under AppData\Local\UpdateHelpers.
  • Identify scheduled task creation events that invoke VBS execution paths consistent with UpdateHelper.vbs. (ClearSky Cyber Security)
  • Proxy and DNS telemetry: investigate endpoints contacting virtualdailyplanner[.]pro, particularly the /getcalendar, /eventmanager, and /planneractivate paths.

Containment

  • Block the identified infrastructure at DNS and web proxy layers (defanged indicators above).
  • Isolate hosts showing the UpdateHelpers artefacts plus C2 traffic patterns, as this suggests successful stage progression.

Forensic artefacts to collect

  • Copies of config.library-ms, WallpapperSet.jpg, and MeowMeowProgram.exe from affected hosts, plus scheduled task definitions referencing the VBS stage.
  • Full process trees around mshta.exe, script hosts, and any subsequent executable launches that include suspicious command-line parameters (-renew, -v). (ClearSky Cyber Security)

Mitigation Recommendations

  • Reduce HTA abuse: restrict or monitor HTA execution and mshta.exe usage in user contexts; prioritise alerting when HTA execution is followed by script drop and scheduled task creation. (MITRE ATT&CK)
  • Control script execution: harden Windows Script Host exposure and monitor VBS execution from user-writable directories.
  • Detect steganographic staging: alert on scripts that read image files and write PE-like output, especially where image parsing markers are present. (MITRE ATT&CK)
  • Short-link hygiene: consider policy or technical controls that flag link shorteners and unusual redirect chains in inbound email.
  • Continuous validation: where feasible, convert the reported chain into adversary emulation and run it routinely to measure whether controls still detect and stop key behaviours after environment changes, as demonstrated by Scythe. (Scythe)

Further Reading