Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 15, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 15, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 15, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 15, 2025

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025

      Microsoft plans to lay off 3% of its workforce, reportedly targeting management cuts as it changes to fit a “dynamic marketplace”

      May 15, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      A cross-platform Markdown note-taking application

      May 15, 2025
      Recent

      A cross-platform Markdown note-taking application

      May 15, 2025

      AI Assistant Demo & Tips for Enterprise Projects

      May 15, 2025

      Celebrating Global Accessibility Awareness Day (GAAD)

      May 15, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025
      Recent

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Andariel APT Using DoraRAT and Nestdoor Malware to Spy on South Korean Businesses

    Andariel APT Using DoraRAT and Nestdoor Malware to Spy on South Korean Businesses

    May 31, 2024

    Researchers have uncovered new attacks by a North Korean advanced persistent threat actor – Andariel APT group – targeting Korean corporations and other organizations. The victims include educational institutions and companies in the manufacturing and construction sectors.

    The attackers employed keyloggers, infostealers, and proxy tools alongside backdoors to control and extract data from compromised systems, said researchers at the AhnLab Security Intelligence Center (ASEC).

    The malware used in these attacks includes strains previously attributed to the Andariel APT group, including the backdoor “Nestdoor.” Additional tools include web shells and proxy tools linked to the North Korean Lazarus group that now contain modifications compared to earlier versions.

    Researchers first observed a confirmed attack case where a malware was distributed via a web server running an outdated 2013 version of Apache Tomcat, which is vulnerable to various attacks. “The threat actor used the web server to install backdoors, proxy tools, etc.,” the researchers said.

    Apache Tomcat compromised to spread malware by Andariel APT. (Credit: Ahnlab)

    Malware Used by Andariel APT in this Campaign

    The first of the two malware strains used in the latest campaign was Nestdoor, a remote access trojan (RAT) that has been active since May 2022. This RAT can execute commands from the threat actor to control infected systems.

    Nestdoor has been found in numerous Andariel attacks, including those exploiting the VMware Horizon product’s Log4Shell vulnerability (CVE-2021-44228). The malware is developed in C++ and features capabilities such as file upload/download, reverse shell, command execution, keylogging, clipboard logging, and proxy functionalities.

    A specific case in 2022 involved Nestdoor being distributed alongside TigerRAT using the same command and control (C&C) server. Another incident in early 2024 saw Nestdoor disguised as an OpenVPN installer. This version maintained persistence via the Task Scheduler and communicated with a C&C server.

    The Andariel APT has been developing new malware strains in the Go language for each campaign. Dora RAT, a recent discovery is one such malware strain.

    The backdoor malware supports reverse shell and file transfer operations and exists in two forms: a standalone executable and an injected process within “explorer.exe.” The latter variant uses an executable in WinRAR SFX format, which includes an injector malware. The Dora RAT has been signed with a valid certificate from a UK software developer in an attempt to make it look legitimate.

    Additional Malware Strains

    Keylogger/Cliplogger: Performs basic functions like logging keystrokes and clipboard contents, stored in the “%TEMP%” directory.
    Stealer: It is designed to exfiltrate files from the system, potentially handling large quantities of data.
    Proxy: Includes both custom-created proxy tools and open-source Socks5 proxy tools. Some proxies are similar to those used by the Lazarus group in past attacks.

    The Andariel group, part of the larger Lazarus umbrella, has shifted from targeting national security information to also pursuing financial gains. Last month, the South Korean National Police Agency revealed a targeted campaign of the Andariel APT aimed at stealing the country’s defense technology.

    Andariel APT hackers gained access to defense industry data by compromising an employee account, which was used in maintaining servers of a defense industry partner. The hackers injected malicious code into the partner’s servers around October 2022, and extracted stored defense technology data. This breach exploited a loophole in how employees used their personal and professional email accounts for official system access.

    Andariel APT’s initial attack methodology primarily includes spear phishing, watering hole attacks, and exploiting software vulnerabilities. Users should remain cautious with email attachments from unknown sources and executable files from websites. Security administrators are advised to keep software patched and updated, including operating systems and browsers, to mitigate the risk of malware infections, the researchers recommended.

    IoCs to Watch for Signs of Andariel APT Attacks

    IoCs to monitor for attacks from Andariel APT group include:

    MD5s
    – 7416ea48102e2715c87edd49ddbd1526: Nestdoor – Recent attack case (nest.exe)
    – a2aefb7ab6c644aa8eeb482e27b2dbc4: Nestdoor – TigerRAT attack case (psfile.exe)
    – e7fd7f48fbf5635a04e302af50dfb651: Nestdoor – OpenVPN attack case (openvpnsvc.exe)
    – 33b2b5b7c830c34c688cf6ced287e5be: Nestdoor launcher (FirewallAPI.dll)
    – 4bc571925a80d4ae4aab1e8900bf753c: Dora RAT dropper (spsvc.exe)
    – 951e9fcd048b919516693b25c13a9ef2: Dora RAT dropper (emaupdate.exe)
    – fee610058c417b6c4b3054935b7e2730: Dora RAT injector (version.dll)
    – afc5a07d6e438880cea63920277ed270: Dora RAT injector (version.dll)
    – d92a317ef4d60dc491082a2fe6eb7a70: Dora RAT (emaupdate.exe)
    – 5df3c3e1f423f1cce5bf75f067d1d05c: Dora RAT (msload.exe)
    – 094f9a757c6dbd6030bc6dae3f8feab3: Dora RAT (emagent.exe)
    – 468c369893d6fc6614d24ea89e149e80: Keylogger/Cliplogger (conhosts.exe)
    – 5e00df548f2dcf7a808f1337f443f3d9: Stealer (msload.exe)

    C&Cs
    – 45.58.159[.]237:443: Nestdoor – Recent attack case
    – 4.246.149[.]227:1443: Nestdoor – TigerRAT attack case
    – 209.127.19[.]223:443: Nestdoor – OpenVPN attack case
    – kmobile.bestunif[.]com:443 – Dora RAT
    – 206.72.205[.]117:443 – Dora RAT

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCopilot+ Recall is ‘Dumbest Cybersecurity Move in a Decade’: Researcher
    Next Article Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S.

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4732 – TOTOLINK A3002R/A3002RU HTTP POST Request Handler Buffer Overflow

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Changelog

    Development

    Avowed review and Metacritic roundup — Here’s what critics are saying about the new Xbox RPG

    News & Updates

    Enhance speech synthesis and video generation models with RLHF using audio and video segmentation in Amazon SageMaker

    Development

    TestART: Achieving 78.55% Pass Rate and 90.96% Coverage with a Co-Evolutionary Approach to LLM-Based Unit Test Generation and Repair

    Development

    Highlights

    Development

    LockBit Ransomware Group Allegedly Strikes Heras UK in Cyberattack

    May 30, 2024

    The LockBit ransomware group has targeted Heras UK, a prominent European provider of end-to-end perimeter…

    CoGUI Phishing Kit: Advanced Evasion Tactics Target Japan

    May 7, 2025

    How to Better Protect Your Intellectual Property

    February 11, 2025

    People Who Ship: Building Centralized AI Tooling

    May 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.