New Dohdoor malware campaign targets education and health care
A malicious campaign by threat actor UAT-10027 has been targeting education and healthcare sectors in the United States since December 2025. The campaign utilizes a new backdoor called Dohdoor, which employs DNS-over-HTTPS for stealthy command-and-control communications and can download and execute payloads reflectively. The multi-stage attack chain likely begins with phishing emails, followed by PowerShell scripts, batch files, and DLL sideloading techniques. Dohdoor uses various evasion methods, including API obfuscation, encrypted communications, and EDR bypasses. The campaign's infrastructure leverages Cloudflare services for stealth. While some techniques overlap with North Korean APT groups, the targeting differs from their typical focus.
AI Analysis
Technical Summary
The Dohdoor malware campaign, first observed in December 2025, is a targeted attack against the education and healthcare sectors in the United States. The threat actor UAT-10027 employs a novel backdoor named Dohdoor that uses DNS-over-HTTPS (DoH) for command-and-control (C2) communications, enhancing stealth by blending malicious traffic with legitimate encrypted DNS queries. The attack chain is multi-staged, typically initiated via phishing emails that deliver PowerShell scripts and batch files to establish initial footholds. Subsequent stages involve DLL sideloading, a technique where malicious DLLs are loaded by legitimate executables, evading traditional detection. Dohdoor uses API obfuscation to hinder analysis and detection, encrypted communications to protect data in transit, and employs various EDR bypass techniques to avoid endpoint security solutions. The campaign's infrastructure is hosted behind Cloudflare services, further complicating attribution and detection by hiding IP addresses and masking traffic patterns. While some tactics and techniques overlap with those used by North Korean APT groups, Dohdoor’s targeting of U.S. education and healthcare institutions marks a distinct operational focus. No known public exploits or patches exist, and the campaign remains active, emphasizing the need for vigilant monitoring and tailored defensive measures.
Potential Impact
The Dohdoor campaign poses significant risks to targeted organizations, particularly in the education and healthcare sectors, which often hold sensitive personal, financial, and health-related data. Successful compromise could lead to unauthorized access, data theft, disruption of critical services, and potential ransomware deployment or further lateral movement within networks. The use of DNS-over-HTTPS for C2 communications complicates detection and response, potentially allowing prolonged undetected presence. EDR bypass techniques reduce the effectiveness of common endpoint security tools, increasing the likelihood of successful exploitation. The campaign’s stealthy nature and multi-stage infection chain increase the difficulty of timely detection and remediation, potentially resulting in significant operational disruption and reputational damage. Given the critical nature of healthcare and education services, any disruption or data breach could have severe consequences for individuals and organizations alike.
Mitigation Recommendations
Organizations should implement multi-layered defenses focusing on detection and prevention of phishing attacks, including user training and robust email filtering solutions. Monitoring DNS traffic for anomalous DoH queries, especially those directed at suspicious or newly registered domains, can help identify Dohdoor C2 communications. Employing network segmentation and strict application whitelisting can limit DLL sideloading opportunities. Endpoint detection solutions should be tuned to detect API obfuscation and unusual process behaviors, and advanced threat hunting should focus on identifying PowerShell and batch script execution anomalies. Leveraging threat intelligence feeds to update detection rules with indicators related to Dohdoor and UAT-10027 infrastructure is critical. Cloudflare-hosted infrastructure requires enhanced scrutiny of encrypted traffic patterns and domain reputation. Incident response plans should be updated to address multi-stage attack chains and incorporate forensic capabilities to analyze DLL sideloading and reflective payload execution. Regular backups and recovery procedures must be maintained to mitigate potential data loss or ransomware impacts.
Affected Countries
United States
Indicators of Compromise
- hash: 466556e923186364e82cbdb4cad8df2c
- hash: 7ff31977972c224a76155d13b6d685e3
- hash: 02d0a6b856c8ed2e0e1da1cc2d97c970
- hash: 17b77ba7b53b37278bbdb0d87c5360b2
- hash: 263b009628af7b51304b4dbd1ee6f501
- hash: 303747acb66294748fe82db9aa537b00
- hash: 4d40af2ee089c89ba39d7e04f53b0892
- hash: c628485437a3a1916be71450ce8bf32f
- hash: cf2904701409bd4c8b33321086d47337
- hash: 07d7a95832a5340021dacdfa6751f3adc019c8c1
- hash: 54a186dd011da95c27de8e084c9411317a212f75
- hash: 5705ed8ebe38d826a2a626c1000bd7d00afbb9a3
- hash: 7b7e43e1264677da48832637d7ec9589a80d8661
- hash: 968b1b1432da1153737cc6617f23b96da6385e6f
- hash: a20b1d45f0ea23acde71ecbbefe96e95a74c0150
- hash: bd4c71632d56c5fe74ceee63f4a40f4d79769fce
- hash: 0bb130b1fafb17705d31fe5dd25e7b2d62176578609d75cc57911ef5582ef17a
- hash: 2ce3e75997f89b98dd280d164a5f21f7565f4de26eed61243badde04b480700e
- hash: 54545fa3a2d8da6746021812ebaa9d26f33bba4f63c6f7f35caa6fa4ee8c0e6a
- hash: 54e18978c6405f56cd59ba55a62291436639f21cf325ae509f0599b15e8f7f53
- hash: 800faaf15d5f42f2ab2c1d2b6b65c8a9e4def6dc10f6ce4e269dcf23f4e8dae2
- hash: 8e97c677aec905152f8a92fed50bb84ef2e8985d5c29330c5a05a4a2afcbd4a5
- hash: b1bd8f7d4488977cca03954a57f5c8ad7bfd4609bcc3bae92326830fcbd3232c
- url: http://LsyPdQGXrEDfPx.MSwInSofTUpDloAd.dESign/111111?sub=s
- url: http://ezQrvkFgEJWCTDNc.pNuiSCKMhwAgZvdyjrlBEFT.softwarE/111111?sub=d
- url: http://lBaNDUgZCFG.deepInspectiOnSYSTEM.oNLiNE/X111111
- domain: cjitdrpwnna.mswinsoftupdload.design
- domain: ezqrvkfgejwctdnc.pnuisckmhwagzvdyjrlbeft.software
- domain: gitkzxd.pnuisckmhwagzvdyjrlbeft.software
- domain: gppiwogwndiakkdu.pnuisckmhwagzvdyjrlbeft.software
- domain: lbandugzcfg.deepinspectionsystem.online
- domain: llalwpijnjskclwy.pnuisckmhwagzvdyjrlbeft.software
- domain: lsypdqgxredfpx.mswinsoftupdload.design
- domain: qhtckzbxtkdvyr.mswinsoftupdload.design
- domain: sdxsiol.pnuisckmhwagzvdyjrlbeft.software
- domain: txjiqslrrig.mswinsoftupdload.design
- domain: yhdjtylnsmwvuu.deepinspectionsystem.online
New Dohdoor malware campaign targets education and health care
Description
A malicious campaign by threat actor UAT-10027 has been targeting education and healthcare sectors in the United States since December 2025. The campaign utilizes a new backdoor called Dohdoor, which employs DNS-over-HTTPS for stealthy command-and-control communications and can download and execute payloads reflectively. The multi-stage attack chain likely begins with phishing emails, followed by PowerShell scripts, batch files, and DLL sideloading techniques. Dohdoor uses various evasion methods, including API obfuscation, encrypted communications, and EDR bypasses. The campaign's infrastructure leverages Cloudflare services for stealth. While some techniques overlap with North Korean APT groups, the targeting differs from their typical focus.
AI-Powered Analysis
Technical Analysis
The Dohdoor malware campaign, first observed in December 2025, is a targeted attack against the education and healthcare sectors in the United States. The threat actor UAT-10027 employs a novel backdoor named Dohdoor that uses DNS-over-HTTPS (DoH) for command-and-control (C2) communications, enhancing stealth by blending malicious traffic with legitimate encrypted DNS queries. The attack chain is multi-staged, typically initiated via phishing emails that deliver PowerShell scripts and batch files to establish initial footholds. Subsequent stages involve DLL sideloading, a technique where malicious DLLs are loaded by legitimate executables, evading traditional detection. Dohdoor uses API obfuscation to hinder analysis and detection, encrypted communications to protect data in transit, and employs various EDR bypass techniques to avoid endpoint security solutions. The campaign's infrastructure is hosted behind Cloudflare services, further complicating attribution and detection by hiding IP addresses and masking traffic patterns. While some tactics and techniques overlap with those used by North Korean APT groups, Dohdoor’s targeting of U.S. education and healthcare institutions marks a distinct operational focus. No known public exploits or patches exist, and the campaign remains active, emphasizing the need for vigilant monitoring and tailored defensive measures.
Potential Impact
The Dohdoor campaign poses significant risks to targeted organizations, particularly in the education and healthcare sectors, which often hold sensitive personal, financial, and health-related data. Successful compromise could lead to unauthorized access, data theft, disruption of critical services, and potential ransomware deployment or further lateral movement within networks. The use of DNS-over-HTTPS for C2 communications complicates detection and response, potentially allowing prolonged undetected presence. EDR bypass techniques reduce the effectiveness of common endpoint security tools, increasing the likelihood of successful exploitation. The campaign’s stealthy nature and multi-stage infection chain increase the difficulty of timely detection and remediation, potentially resulting in significant operational disruption and reputational damage. Given the critical nature of healthcare and education services, any disruption or data breach could have severe consequences for individuals and organizations alike.
Mitigation Recommendations
Organizations should implement multi-layered defenses focusing on detection and prevention of phishing attacks, including user training and robust email filtering solutions. Monitoring DNS traffic for anomalous DoH queries, especially those directed at suspicious or newly registered domains, can help identify Dohdoor C2 communications. Employing network segmentation and strict application whitelisting can limit DLL sideloading opportunities. Endpoint detection solutions should be tuned to detect API obfuscation and unusual process behaviors, and advanced threat hunting should focus on identifying PowerShell and batch script execution anomalies. Leveraging threat intelligence feeds to update detection rules with indicators related to Dohdoor and UAT-10027 infrastructure is critical. Cloudflare-hosted infrastructure requires enhanced scrutiny of encrypted traffic patterns and domain reputation. Incident response plans should be updated to address multi-stage attack chains and incorporate forensic capabilities to analyze DLL sideloading and reflective payload execution. Regular backups and recovery procedures must be maintained to mitigate potential data loss or ransomware impacts.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.talosintelligence.com/new-dohdoor-malware-campaign/"]
- Adversary
- UAT-10027
- Pulse Id
- 69a1649bf2952cacd54d98fb
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash466556e923186364e82cbdb4cad8df2c | — | |
hash7ff31977972c224a76155d13b6d685e3 | — | |
hash02d0a6b856c8ed2e0e1da1cc2d97c970 | MD5 of b1bd8f7d4488977cca03954a57f5c8ad7bfd4609bcc3bae92326830fcbd3232c | |
hash17b77ba7b53b37278bbdb0d87c5360b2 | MD5 of 8e97c677aec905152f8a92fed50bb84ef2e8985d5c29330c5a05a4a2afcbd4a5 | |
hash263b009628af7b51304b4dbd1ee6f501 | MD5 of 0bb130b1fafb17705d31fe5dd25e7b2d62176578609d75cc57911ef5582ef17a | |
hash303747acb66294748fe82db9aa537b00 | MD5 of 800faaf15d5f42f2ab2c1d2b6b65c8a9e4def6dc10f6ce4e269dcf23f4e8dae2 | |
hash4d40af2ee089c89ba39d7e04f53b0892 | MD5 of 54e18978c6405f56cd59ba55a62291436639f21cf325ae509f0599b15e8f7f53 | |
hashc628485437a3a1916be71450ce8bf32f | MD5 of 54545fa3a2d8da6746021812ebaa9d26f33bba4f63c6f7f35caa6fa4ee8c0e6a | |
hashcf2904701409bd4c8b33321086d47337 | MD5 of 2ce3e75997f89b98dd280d164a5f21f7565f4de26eed61243badde04b480700e | |
hash07d7a95832a5340021dacdfa6751f3adc019c8c1 | SHA1 of 2ce3e75997f89b98dd280d164a5f21f7565f4de26eed61243badde04b480700e | |
hash54a186dd011da95c27de8e084c9411317a212f75 | SHA1 of 8e97c677aec905152f8a92fed50bb84ef2e8985d5c29330c5a05a4a2afcbd4a5 | |
hash5705ed8ebe38d826a2a626c1000bd7d00afbb9a3 | SHA1 of 800faaf15d5f42f2ab2c1d2b6b65c8a9e4def6dc10f6ce4e269dcf23f4e8dae2 | |
hash7b7e43e1264677da48832637d7ec9589a80d8661 | SHA1 of 54545fa3a2d8da6746021812ebaa9d26f33bba4f63c6f7f35caa6fa4ee8c0e6a | |
hash968b1b1432da1153737cc6617f23b96da6385e6f | SHA1 of b1bd8f7d4488977cca03954a57f5c8ad7bfd4609bcc3bae92326830fcbd3232c | |
hasha20b1d45f0ea23acde71ecbbefe96e95a74c0150 | SHA1 of 54e18978c6405f56cd59ba55a62291436639f21cf325ae509f0599b15e8f7f53 | |
hashbd4c71632d56c5fe74ceee63f4a40f4d79769fce | SHA1 of 0bb130b1fafb17705d31fe5dd25e7b2d62176578609d75cc57911ef5582ef17a | |
hash0bb130b1fafb17705d31fe5dd25e7b2d62176578609d75cc57911ef5582ef17a | — | |
hash2ce3e75997f89b98dd280d164a5f21f7565f4de26eed61243badde04b480700e | — | |
hash54545fa3a2d8da6746021812ebaa9d26f33bba4f63c6f7f35caa6fa4ee8c0e6a | — | |
hash54e18978c6405f56cd59ba55a62291436639f21cf325ae509f0599b15e8f7f53 | — | |
hash800faaf15d5f42f2ab2c1d2b6b65c8a9e4def6dc10f6ce4e269dcf23f4e8dae2 | — | |
hash8e97c677aec905152f8a92fed50bb84ef2e8985d5c29330c5a05a4a2afcbd4a5 | — | |
hashb1bd8f7d4488977cca03954a57f5c8ad7bfd4609bcc3bae92326830fcbd3232c | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://LsyPdQGXrEDfPx.MSwInSofTUpDloAd.dESign/111111?sub=s | — | |
urlhttp://ezQrvkFgEJWCTDNc.pNuiSCKMhwAgZvdyjrlBEFT.softwarE/111111?sub=d | — | |
urlhttp://lBaNDUgZCFG.deepInspectiOnSYSTEM.oNLiNE/X111111 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincjitdrpwnna.mswinsoftupdload.design | — | |
domainezqrvkfgejwctdnc.pnuisckmhwagzvdyjrlbeft.software | — | |
domaingitkzxd.pnuisckmhwagzvdyjrlbeft.software | — | |
domaingppiwogwndiakkdu.pnuisckmhwagzvdyjrlbeft.software | — | |
domainlbandugzcfg.deepinspectionsystem.online | — | |
domainllalwpijnjskclwy.pnuisckmhwagzvdyjrlbeft.software | — | |
domainlsypdqgxredfpx.mswinsoftupdload.design | — | |
domainqhtckzbxtkdvyr.mswinsoftupdload.design | — | |
domainsdxsiol.pnuisckmhwagzvdyjrlbeft.software | — | |
domaintxjiqslrrig.mswinsoftupdload.design | — | |
domainyhdjtylnsmwvuu.deepinspectionsystem.online | — |
Threat ID: 69a16d8732ffcdb8a2195d9d
Added to database: 2/27/2026, 10:10:15 AM
Last enriched: 2/27/2026, 10:29:51 AM
Last updated: 2/28/2026, 4:36:01 AM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Maltrail IOC for 2026-02-28
MediumThreatFox IOCs for 2026-02-27
MediumMaltrail IOC for 2026-02-27
MediumFake Fedex Email Delivers Donuts!, (Fri, Feb 27th)
MediumContagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains - Part 1
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.