Abuse of DNS-over-HTTPS (DoH) for Covert Command-and-Control Communications

Summary:

Using a sophisticated multi-stage intrusion technique to establish covert persistence, the threat cluster UAT-10027 has been targeting healthcare and education institutions in the United States since December 2025. The campaign leverages a newly observed backdoor named Dohdoor, which conceals command-and-control (C2) communications by abusing trusted infrastructure such as Cloudflare and DNS-over-HTTPS (DoH).

The malware is typically delivered through suspected phishing activity and executed using PowerShell in combination with DLL side-loading techniques. Once active, the threat deploys Cobalt Strike beacons directly in memory while employing endpoint detection and response (EDR) evasion techniques to maintain persistence. This activity presents significant operational and security risks and highlights the growing importance of monitoring encrypted traffic patterns and anomalous endpoint behaviour.

Technical Description :

UAT-10027 initiates the infection chain through a suspected phishing vector that triggers the execution of a PowerShell script, which subsequently downloads a secondary batch file from a remote staging server. This batch file retrieves a malicious DLL payload, typically named propsys.dll or batmeter.dll.

The payload, referred to as Dohdoor, is executed through DLL side-loading using legitimate Windows binaries such as Fondue.exe, mblctr.exe, or ScreenClippingHost.exe, allowing the malware to blend into legitimate system activity and evade security monitoring.

To maintain covert communications, Dohdoor establishes command-and-control channels using DNS-over-HTTPS, routing encrypted traffic through Cloudflare-proxied infrastructure to bypass conventional DNS monitoring and network detection mechanisms. The malware incorporates defense evasion mechanisms such as NTDLL unhooking, allowing it to bypass user-mode EDR monitoring. Additionally, it supports reflective loading of additional payloads, including Cobalt Strike Beacons, directly into memory. The details and technicalities of the attack campaign are discussed further.

Delivery and Infection Chain:

Although definitive evidence of the initial access vector is limited, analysis indicates that phishing-based social engineering is the most likely entry point. The infection process is believed to begin when victims are manipulated into executing a malicious PowerShell script.

The script retrieves a secondary Windows batch file from a remote staging infrastructure, which subsequently downloads the malicious DLL payload (propsys.dll or batmeter.dll) onto the compromised host. The Infection chain was identified as follows

  • The attack is believed to begin with phishing-based social engineering that triggers the execution of a malicious PowerShell script on the victim's system.
  • The PowerShell script downloads a secondary Windows batch file from a remote staging server, which then retrieves a malicious DLL file such as propsys.dll or batmeter.dll.
  • The malicious DLL, Dohdoor, is executed through DLL side-loading using legitimate Windows binaries, including Fondue.exe, mblctr.exe, or ScreenClippingHost.exe to evade detection.
  • Once active, Dohdoor establishes command-and-control communication over DNS-over-HTTPS, routing encrypted traffic through infrastructure proxied by Cloudflare to bypass DNS monitoring and network security controls.
  • The backdoor subsequently reflectively loads additional payloads directly into memory, including the observed deployment of a Cobalt Strike Beacon, enabling persistence, lateral movement, and extended post-exploitation activity.

Technical Capabilities:

By leveraging DNS-over-HTTPS (DoH) to encrypt command-and-control communications, Dohdoor enables outbound traffic to appear as legitimate HTTPS traffic, allowing it to evade detection by traditional DNS inspection mechanisms and network monitoring solutions. Routing communications through Cloudflare-proxied infrastructure further obscures the true location of command servers and reduces the likelihood of domain blocking or sinkholing.

The backdoor also supports reflective DLL loading, enabling it to retrieve and execute additional payloads entirely in memory without writing files to disk. This capability significantly reduces forensic artifacts and minimizes opportunities for signature-based detection.

In addition to covert communications, Dohdoor incorporates sophisticated defense-evasion mechanisms. By unhooking NTDLL system calls, the malware bypasses user-mode API monitoring commonly implemented by endpoint detection and response platforms, thereby reducing behavioral visibility on compromised systems. The deployment of Cobalt Strike Beacon as a secondary payload enables extensive post-exploitation functionality, including persistence, lateral movement, credential harvesting, and remote command execution. Collectively, these capabilities indicate a mature intrusion toolkit designed for stealth, persistence, and operational resilience in targeted environments.

Attribution and Evolution:

Although no definitive attribution has been established, researchers have identified tactical similarities between the Dohdoor toolkit and malware historically associated with the Lazarus Group. However, the victim profile observed in this campaign differs from Lazarus’ typical targeting priorities.

At the same time, targeting patterns partially overlap with activity previously attributed to Kimsuky, particularly in the education sector. While confirmation remains pending, these overlaps may indicate shared tooling, code reuse, or evolving tradecraft among North Korean-aligned threat actors.

Active Campaign and Geographic Spread:

The campaign, active since at least December 2025, primarily targets organizations in the United States, particularly within the healthcare and education sectors. Confirmed victims include universities connected to broader academic networks and healthcare institutions providing senior care services.

The interconnected nature of educational and healthcare ecosystems raises concerns about potential downstream compromises, as breaches within a single institution may expose affiliated networks and partner organizations.

Conclusion:

UAT-10027 represents a sophisticated multi-stage intrusion campaign leveraging memory-resident payload execution, encrypted DNS communication channels, trusted cloud infrastructure, and advanced endpoint evasion techniques to maintain stealthy and persistent access.

The campaign’s focus on healthcare and education institutions suggests both strategic intelligence interests and potential financial motivations. Organizations should prioritize enhanced monitoring of DNS-over-HTTPS traffic, PowerShell activity, DLL side-loading behavior, and abnormal endpoint activity to mitigate exposure to this evolving threat landscape.

Impact:

Although no confirmed data exfiltration has yet been reported, the presence of persistent backdoor access combined with Cobalt Strike deployment indicates significant operational risk. Long-term access could enable attackers to conduct reconnaissance, credential harvesting, lateral movement, ransomware deployment, or data theft.

The targeted sectors hold highly sensitive information, including research data, healthcare records, and personal data, increasing the potential impact of compromise. The operational dependencies and interconnected nature of these sectors further amplify the potential damage from prolonged attacker presence.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Execution, Persistence, Defense Evasion, Command and Control, Lateral Movement
Technique Name Phishing
PowerShell Execution
DLL Side Loading
Reflective DLL Injection
Encrypted Command and Control
Sub Technique Name Spearphishing Attachment or Link
Command Shell via PowerShell
DLL Search Order Hijacking
In Memory Payload Execution
DNS over HTTPS for C2
Attack Type Multi stage targeted intrusion with backdoor deployment and post exploitation framework delivery
Targeted Applications Microsoft Windows environments, PowerShell, legitimate Windows binaries such as Fondue.exe, mblctr.exe, ScreenClippingHost.exe
Region Impacted United States
Industry Impacted Education & Healthcare sector
IOC’s SHA256 - Hash
54e18978c6405f56cd59ba55a62291436639f21cf325ae509f0599b15e8f7f53
0bb130b1fafb17705d31fe5dd25e7b2d62176578609d75cc57911ef5582ef17a
54545fa3a2d8da6746021812ebaa9d26f33bba4f63c6f7f35caa6fa4ee8c0e6a
8e97c677aec905152f8a92fed50bb84ef2e8985d5c29330c5a05a4a2afcbd4a5
800faaf15d5f42f2ab2c1d2b6b65c8a9e4def6dc10f6ce4e269dcf23f4e8dae2
b1bd8f7d4488977cca03954a57f5c8ad7bfd4609bcc3bae92326830fcbd3232c
2ce3e75997f89b98dd280d164a5f21f7565f4de26eed61243badde04b480700e

Domains
CJiTDrpwnnA[.]MswINsoFTUPDLoad[.]deSigN
LBaNDUgZCFG[.]deepInspectiOnSYSTEM[.]oNLiNE
LsyPdQGXrEDfPx[.]MSwInSofTUpDloAd[.]dESign
YHDJTyLNsMWVuU[.]DEEPinSPeCTioNsyStEM[.]OnLiNe
SDXsIol[.]PNUIsckmHwAgzVdYJRlbeFT[.]SoftWarE
EzQrvkFgEJWCTDNc[.]pNuiSCKMhwAgZvdyjrlBEFT[.]softwarE
txjIQslrRIg[.]MSwINSOFTUPDLoaD[.]DesiGN
QHtcKZBXtKdVyr[.]mSWinSoFTUpdLOAD[.]DeSIgn
GITkzxd[.]pNUIScKMhWAgZvdyJRlBEFT[.]SoFtwaRE
GppiwoGwNdiakkDU[.]pnuiSckMHwaGzvDYjRLbeFt[.]SoFTWARe

URLs
hxxp[://]gITkzxd[.]pNUIScKMhWAgZvdyJRlBEFT[.]SoFtwaRE/X111111
hxxp[://]GppiwoGwNdiakkDU[.]pnuiSckMHwaGzvDYjRLbeFt[.]SoFTWARe/111111?sub=s
hxxp[://]lBaNDUgZCFG[.]deepInspectiOnSYSTEM[.]oNLiNE/X111111
hxxp[://]CJiTDrpwnnA[.]MswINsoFTUPDLoad[.]deSigN/x111111
hxxp[://]LsyPdQGXrEDfPx[.]MSwInSofTUpDloAd[.]dESign/111111?sub=s
hxxp[://]sDXsIol[.]PNUIsckmHwAgzVdYJRlbeFT[.]SoftWarE/X111111
hxxp[://]ezQrvkFgEJWCTDNc[.]pNuiSCKMhwAgZvdyjrlBEFT[.]softwarE/111111?sub=d
hxxp[://]lLalWpIJnjskClwY[.]PnUiscKMhWaGzVdyJRlBEfT[.]SofTWaRe/111111?sub=s
CVE NA

Recommended Actions:

  • Implement enhanced monitoring of DNS-over-HTTPS traffic to detect anomalous or suspicious command-and-control communications.
  • Enforce strict PowerShell execution policies and enable script logging to detect unauthorized or malicious script activity.
  • Monitor for DLL side-loading attempts and unusual execution of legitimate binaries such as Fondue.exe, mblctr.exe, or ScreenClippingHost.exe.
  • Deploy advanced endpoint detection solutions capable of identifying in-memory payload execution and reflective DLL loading.
  • Regularly patch and update Windows systems to reduce exposure to exploitation vectors.
  • Conduct targeted phishing awareness training to reduce the likelihood of initial compromise.
  • Implement network segmentation for sensitive systems, particularly within healthcare and educational environments, to limit lateral movement.
  • Maintain regular offline backups and ensure secure storage of sensitive data to mitigate the impact of ransomware or destructive payload deployment.

Reference :

https://blog.talosintelligence.com/new-dohdoor-malware-campaign/