Security researchers have uncovered a sophisticated phishing campaign that’s been active since July 2024, targeting Russian enterprises with Batavia, a previously undocumented Windows spyware designed for document theft and internal reconnaissance
🎣 Infection Begins with Phishing
-
Fake contract emails arrive from domains like oblast-ru[.]com, used by the attackers.
-
Victims click a link and download an archive containing a malicious
.vbe
script disguised as a contract
🧩 Multi‑Stage Malware Chain
1. VBE Downloader
The Visual Basic‑encoded script profiles the host—collecting OS and system information—and submits it to the C2 server. It then pulls down WebView.exe
, saving it to the %TEMP%
folder.
2. Delphi‑Based WebView.exe
This executable displays a fake contract to distract users while:
-
Collecting documents (*.doc, *.pdf, .xls), screenshots, system logs, and files from connected devices.
-
Exfiltrating data to
ru‑exchange[.]com
and pulling another payload,javav.exe
3. C++ Loader Javav.exe
The third stage expands its scope:
-
Harvests images, emails, archives, and more.
-
Changes C2 endpoints and downloads a final executable,
windowsmsg.exe
, using a UAC bypass viacomputerdefaults.exe
📊 Breadth of Infection
-
Over 100 users across industrial organizations have received the phishing emails since early 2025
The campaign has intensified since March and remains active
✅ Defense Recommendations
-
Email hygiene & training: Educate staff to scrutinize contract-related email links and look out for suspicious domains.
-
Script-blocking controls: Restrict or monitor
.vbe
and other script execution. -
Behavior-based EDR tools: Deploy monitoring to detect unusual process launches like
computerdefaults.exe
misuse. -
Network monitoring: Watch for encrypted connections to unknown C2 servers like
ru‑exchange[.]com
🎯 Final Thoughts
Batavia showcases an advanced multi-layered spyware operation: spear-phishing, custom executables, UAC bypasses, and blended exfiltration—all wrapped in a legitimate-looking contract lure.
Has your environment implemented defenses against file-based phishing or UAC circumvention techniques? Share your strategies or questions below!
Comments
Post a Comment