Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New Dohdoor malware campaign targets education and health care

0
Medium
Published: Fri Feb 27 2026 (02/27/2026, 09:32:11 UTC)
Source: AlienVault OTX General

Description

A malicious campaign by threat actor UAT-10027 has been targeting education and healthcare sectors in the United States since December 2025. The campaign utilizes a new backdoor called Dohdoor, which employs DNS-over-HTTPS for stealthy command-and-control communications and can download and execute payloads reflectively. The multi-stage attack chain likely begins with phishing emails, followed by PowerShell scripts, batch files, and DLL sideloading techniques. Dohdoor uses various evasion methods, including API obfuscation, encrypted communications, and EDR bypasses. The campaign's infrastructure leverages Cloudflare services for stealth. While some techniques overlap with North Korean APT groups, the targeting differs from their typical focus.

AI-Powered Analysis

AILast updated: 02/27/2026, 10:29:51 UTC

Technical Analysis

The Dohdoor malware campaign, first observed in December 2025, is a targeted attack against the education and healthcare sectors in the United States. The threat actor UAT-10027 employs a novel backdoor named Dohdoor that uses DNS-over-HTTPS (DoH) for command-and-control (C2) communications, enhancing stealth by blending malicious traffic with legitimate encrypted DNS queries. The attack chain is multi-staged, typically initiated via phishing emails that deliver PowerShell scripts and batch files to establish initial footholds. Subsequent stages involve DLL sideloading, a technique where malicious DLLs are loaded by legitimate executables, evading traditional detection. Dohdoor uses API obfuscation to hinder analysis and detection, encrypted communications to protect data in transit, and employs various EDR bypass techniques to avoid endpoint security solutions. The campaign's infrastructure is hosted behind Cloudflare services, further complicating attribution and detection by hiding IP addresses and masking traffic patterns. While some tactics and techniques overlap with those used by North Korean APT groups, Dohdoor’s targeting of U.S. education and healthcare institutions marks a distinct operational focus. No known public exploits or patches exist, and the campaign remains active, emphasizing the need for vigilant monitoring and tailored defensive measures.

Potential Impact

The Dohdoor campaign poses significant risks to targeted organizations, particularly in the education and healthcare sectors, which often hold sensitive personal, financial, and health-related data. Successful compromise could lead to unauthorized access, data theft, disruption of critical services, and potential ransomware deployment or further lateral movement within networks. The use of DNS-over-HTTPS for C2 communications complicates detection and response, potentially allowing prolonged undetected presence. EDR bypass techniques reduce the effectiveness of common endpoint security tools, increasing the likelihood of successful exploitation. The campaign’s stealthy nature and multi-stage infection chain increase the difficulty of timely detection and remediation, potentially resulting in significant operational disruption and reputational damage. Given the critical nature of healthcare and education services, any disruption or data breach could have severe consequences for individuals and organizations alike.

Mitigation Recommendations

Organizations should implement multi-layered defenses focusing on detection and prevention of phishing attacks, including user training and robust email filtering solutions. Monitoring DNS traffic for anomalous DoH queries, especially those directed at suspicious or newly registered domains, can help identify Dohdoor C2 communications. Employing network segmentation and strict application whitelisting can limit DLL sideloading opportunities. Endpoint detection solutions should be tuned to detect API obfuscation and unusual process behaviors, and advanced threat hunting should focus on identifying PowerShell and batch script execution anomalies. Leveraging threat intelligence feeds to update detection rules with indicators related to Dohdoor and UAT-10027 infrastructure is critical. Cloudflare-hosted infrastructure requires enhanced scrutiny of encrypted traffic patterns and domain reputation. Incident response plans should be updated to address multi-stage attack chains and incorporate forensic capabilities to analyze DLL sideloading and reflective payload execution. Regular backups and recovery procedures must be maintained to mitigate potential data loss or ransomware impacts.

Affected Countries

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.talosintelligence.com/new-dohdoor-malware-campaign/"]
Adversary
UAT-10027
Pulse Id
69a1649bf2952cacd54d98fb
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash466556e923186364e82cbdb4cad8df2c
hash7ff31977972c224a76155d13b6d685e3
hash02d0a6b856c8ed2e0e1da1cc2d97c970
MD5 of b1bd8f7d4488977cca03954a57f5c8ad7bfd4609bcc3bae92326830fcbd3232c
hash17b77ba7b53b37278bbdb0d87c5360b2
MD5 of 8e97c677aec905152f8a92fed50bb84ef2e8985d5c29330c5a05a4a2afcbd4a5
hash263b009628af7b51304b4dbd1ee6f501
MD5 of 0bb130b1fafb17705d31fe5dd25e7b2d62176578609d75cc57911ef5582ef17a
hash303747acb66294748fe82db9aa537b00
MD5 of 800faaf15d5f42f2ab2c1d2b6b65c8a9e4def6dc10f6ce4e269dcf23f4e8dae2
hash4d40af2ee089c89ba39d7e04f53b0892
MD5 of 54e18978c6405f56cd59ba55a62291436639f21cf325ae509f0599b15e8f7f53
hashc628485437a3a1916be71450ce8bf32f
MD5 of 54545fa3a2d8da6746021812ebaa9d26f33bba4f63c6f7f35caa6fa4ee8c0e6a
hashcf2904701409bd4c8b33321086d47337
MD5 of 2ce3e75997f89b98dd280d164a5f21f7565f4de26eed61243badde04b480700e
hash07d7a95832a5340021dacdfa6751f3adc019c8c1
SHA1 of 2ce3e75997f89b98dd280d164a5f21f7565f4de26eed61243badde04b480700e
hash54a186dd011da95c27de8e084c9411317a212f75
SHA1 of 8e97c677aec905152f8a92fed50bb84ef2e8985d5c29330c5a05a4a2afcbd4a5
hash5705ed8ebe38d826a2a626c1000bd7d00afbb9a3
SHA1 of 800faaf15d5f42f2ab2c1d2b6b65c8a9e4def6dc10f6ce4e269dcf23f4e8dae2
hash7b7e43e1264677da48832637d7ec9589a80d8661
SHA1 of 54545fa3a2d8da6746021812ebaa9d26f33bba4f63c6f7f35caa6fa4ee8c0e6a
hash968b1b1432da1153737cc6617f23b96da6385e6f
SHA1 of b1bd8f7d4488977cca03954a57f5c8ad7bfd4609bcc3bae92326830fcbd3232c
hasha20b1d45f0ea23acde71ecbbefe96e95a74c0150
SHA1 of 54e18978c6405f56cd59ba55a62291436639f21cf325ae509f0599b15e8f7f53
hashbd4c71632d56c5fe74ceee63f4a40f4d79769fce
SHA1 of 0bb130b1fafb17705d31fe5dd25e7b2d62176578609d75cc57911ef5582ef17a
hash0bb130b1fafb17705d31fe5dd25e7b2d62176578609d75cc57911ef5582ef17a
hash2ce3e75997f89b98dd280d164a5f21f7565f4de26eed61243badde04b480700e
hash54545fa3a2d8da6746021812ebaa9d26f33bba4f63c6f7f35caa6fa4ee8c0e6a
hash54e18978c6405f56cd59ba55a62291436639f21cf325ae509f0599b15e8f7f53
hash800faaf15d5f42f2ab2c1d2b6b65c8a9e4def6dc10f6ce4e269dcf23f4e8dae2
hash8e97c677aec905152f8a92fed50bb84ef2e8985d5c29330c5a05a4a2afcbd4a5
hashb1bd8f7d4488977cca03954a57f5c8ad7bfd4609bcc3bae92326830fcbd3232c

Url

ValueDescriptionCopy
urlhttp://LsyPdQGXrEDfPx.MSwInSofTUpDloAd.dESign/111111?sub=s
urlhttp://ezQrvkFgEJWCTDNc.pNuiSCKMhwAgZvdyjrlBEFT.softwarE/111111?sub=d
urlhttp://lBaNDUgZCFG.deepInspectiOnSYSTEM.oNLiNE/X111111

Domain

ValueDescriptionCopy
domaincjitdrpwnna.mswinsoftupdload.design
domainezqrvkfgejwctdnc.pnuisckmhwagzvdyjrlbeft.software
domaingitkzxd.pnuisckmhwagzvdyjrlbeft.software
domaingppiwogwndiakkdu.pnuisckmhwagzvdyjrlbeft.software
domainlbandugzcfg.deepinspectionsystem.online
domainllalwpijnjskclwy.pnuisckmhwagzvdyjrlbeft.software
domainlsypdqgxredfpx.mswinsoftupdload.design
domainqhtckzbxtkdvyr.mswinsoftupdload.design
domainsdxsiol.pnuisckmhwagzvdyjrlbeft.software
domaintxjiqslrrig.mswinsoftupdload.design
domainyhdjtylnsmwvuu.deepinspectionsystem.online

Threat ID: 69a16d8732ffcdb8a2195d9d

Added to database: 2/27/2026, 10:10:15 AM

Last enriched: 2/27/2026, 10:29:51 AM

Last updated: 2/28/2026, 4:36:01 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses