Analysis of APT Attack Cases Using Dora RAT Against Companies

May 30, 2024, 4:02 p.m.

Description

This analysis discusses an APT campaign by the Andariel threat group targeting Korean companies and educational institutions. The campaign employed various malware strains, including Nestdoor backdoor, Dora RAT, keyloggers, infostealers, and proxy tools. The attackers exploited vulnerabilities, such as Apache Tomcat and VMware Horizon's Log4Shell, for initial access and malware distribution. The report provides technical details on the malware strains, Command and Control infrastructure, and tactics utilized by the threat actors.

Date

  • Created: May 30, 2024, 3:37 p.m.
  • Published: May 30, 2024, 3:37 p.m.
  • Modified: May 30, 2024, 4:02 p.m.

Indicators

  • 0995f1f2e4bb43ef7e3dcd57c06154fc812394ac214861c5e30084a215018dbe
  • 3ec2292dc5be0161d25f258f716d92e96c591ab084548679dd7b169f80b2e967
  • 209.127.19.223
  • 4.246.149.227
  • 206.72.205.117
  • 45.58.159.237
  • kmobile.bestunif.com

Attack Patterns

  • Backdoor:Win32/Dora
  • Nestdoor
  • Andariel

Additional Informations

  • Korea, Republic of

Linked vulnerabilities