Fast and Furious – Nimbus Manticore Operations During the Iranian Conflict
Iranian threat actor Nimbus Manticore (UNC1549) conducted a series of campaigns in early 2026 utilizing AppDomain Hijacking, SEO poisoning, and task hijacking to deploy the new MiniFast backdoor. The group demonstrated rapid toolset evolution, likely aided by AI-assisted development, targeting the aviation and software sectors across the US, Europe, and the Middle East.
Authors: Check Point Research
Source:Check Point
- domainbuisness-centeral-transportation[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainbuisness-centeral-transportation[.]comAttacker-controlled domain.
- domainbuisness-centeral[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainbusiness-startup[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainbusiness-startup[.]orgAttacker-controlled domain used in the campaign.
- domainbusinessstartup[.]azurewebsites[.]netAttacker-controlled subdomain.
- domaingetsqldeveloper[.]comFake SQL Developer website used for SEO poisoning and malware distribution.
- domainglobal-check-business-it[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainglobal-check-itbusiness[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainglobal-it-checkbusiness[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainglobal-it-checkers[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainglobal-it-consultants[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainglobalbusiness-checkers-it[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainglobalit-consultants[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainglobalitconsultants[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainlicencemanagers[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainlicencesupporting[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainnanomatrix[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainpeerdistsvcmanagers[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainPremier-HealthAdvisory[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainPremierHealthAdvisory[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainPremierHealthAdvisory[.]comAttacker-controlled domain.
- domainramiltons-finance[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainramiltonsfinance[.]azurewebsites[.]netAttacker-controlled subdomain.
- domainramiltonsfinance[.]comAttacker-controlled domain.
- filenameInitInstall.dllFirst-stage loader in the trojanized Zoom infection chain.
- filenameSetup.exe.configMalicious configuration file used to trigger AppDomain Hijacking.
- filenameUpdateChecker.dllFinal MiniFast backdoor payload.
- filenameuevmonitor.dllFirst-stage dropper loaded via AppDomain Hijacking in the OnlyOffice ZIP campaign.
- sha2560291ef318576953f7f3fe287e7775ed1d7c3206119dc7b9cd6d85c02779e6e40Malware payload associated with Nimbus Manticore.
- sha2560db36a04d304ad96f9e6f97b531934594cd95a5cea9ff2c9af249201089dc864Malware payload associated with Nimbus Manticore.
- sha25610fd541674adadfbba99b54280f7e59732746faf2b10ce68521866f737f1e46dMalware payload associated with Nimbus Manticore.
- sha2562c214494fd0bad31473ca8adce78a4f50847876584571e66aadeae70827ec2dcMalware payload associated with Nimbus Manticore.
- sha256332ba2f0297dfb1599adecc3e9067893e7cf243aa23aedce4906a4c480574c17Malware payload associated with Nimbus Manticore.
- sha25638bd137c672bd58d08c4f0502f993a6561e2c3411773d1ae57ee0151a0a9d11dMalware payload associated with Nimbus Manticore.
- sha25643dc62cef52ebdd69e79f10015b3e13890f26c058325c0ff139c70f8d8eadcfaMalware payload associated with Nimbus Manticore.
- sha25644f4f7aca7f1d9bfdaf7b3736934cbe19f851a707662f8f0b0c49b383e054250Malware payload associated with Nimbus Manticore.
- sha256485f182f7b74ea4013b2539275a95d21e3a9bf0082c331937af9353a324b36f3Malware payload associated with Nimbus Manticore.
- sha2565c3362d20229597d11380f56d1f2eb39647fb6afad7be8392a7abcd18dff12f8Malware payload associated with Nimbus Manticore.
- sha25663d0d3c4a7f71bdbca720903d6a99b832089cc093c64d2938e7e001e56c17ab4Malware payload associated with Nimbus Manticore.
- sha25664530d7e6ee30e4a66d9eeed6b8595c33fd72f5f73409133ca40539e5695df4cMalware payload associated with Nimbus Manticore.
- sha25674882085db2088356ed7f72f01e0404a0a98cda88ef56fb15ce74c1f36b26d27Malware payload associated with Nimbus Manticore.
- sha256781605ce9d4a9869e846f6c9657d71437cb6240ab27ffbc4cd550c0e06996690Malware payload associated with Nimbus Manticore.
- sha2568808c794c24367438f183e4be941876f1d3ecd0c8d2eb43b10d2380841d2283bMalware payload associated with Nimbus Manticore.
- sha2569cf029daca89523d917dafed0568d11d00e45ec96b5b90b4a1f7fd4018c7da84Malware payload associated with Nimbus Manticore.
- sha2569e4a658e6d831c9e9bdfe11884a75b7c64812ed0a80e8495ddf6b316505acac1Malware payload associated with Nimbus Manticore.
- sha256a13ba3c5aff46e9daf2d23df4b3e3d49dc7236c207c56f0a1433051f3450d441Malware payload associated with Nimbus Manticore.
- sha256a57ffb819fe8d98ff925c5d7b239598fe302acf5a13193d7a535040a71298fdfMalware payload associated with Nimbus Manticore.
- sha256b19e06da580cf91691eda066ac9ee4b09c6e5dc26c367af12660fe1f9306eec4Malware payload associated with Nimbus Manticore.
- sha256bc3b44154518c5794ce639108e7b9c5fecb0c189607a26de1aaed518d890c7adMalware payload associated with Nimbus Manticore.
- sha256d4a7e9f107fe40c1a5d0139c6c6e25bf6bf57f61feff090bee28f476bb3cc3c2Malware payload associated with Nimbus Manticore.
- sha256dfa1e3137a032ee8561a1cd5e1a0f71a10bebb36aef7c336c878638a9c1239eeMalware payload associated with Nimbus Manticore.
- sha256ecaf493c320d201d285ef5f61d75744216e47cf1115b4af528f9a78883cc446eMalware payload associated with Nimbus Manticore.
- sha256eee657ffdb2af8ed6412221e7d5fbf4f5742f2ac2c88f43f12db46af0697de71Malware payload associated with Nimbus Manticore.
- sha256f08b17856616d66492a24dced27f788e235f35f42fa7cd10f315000d3a2f4c03Malware payload associated with Nimbus Manticore.
- sha256f54cd38632ac9da3af3533ae93e92625cbcb04df521dbf1b6acfaa81218f9e8cMalware payload associated with Nimbus Manticore.
Detection / HunterGoogle
What Happened
A cyber espionage group linked to Iran, known as Nimbus Manticore, launched a series of attacks targeting the aviation and software industries in the US, Europe, and the Middle East. The attackers used fake job offers, bogus Zoom meeting invites, and a fake software download website to trick victims into installing a new malicious program called MiniFast. This matters because the group is rapidly improving its tactics, potentially using AI to write code, allowing them to steal sensitive data or maintain hidden access to corporate networks. Organizations should educate employees on identifying fake software downloads and monitor their systems for unusual application behaviors.
Key Takeaways
- Nimbus Manticore deployed a new backdoor named MiniFast, replacing the older MiniJunk malware, utilizing AI-assisted development practices.
- The threat actor heavily abused AppDomain Hijacking to execute malicious DLLs via legitimate .NET applications.
- A novel infection vector involved SEO poisoning to distribute a trojanized SQL Developer installer via a fake website.
- The campaign abused a legitimate Zoom installer's execution flow to hijack scheduled tasks for persistence.
- MiniFast communicates via JSON over HTTP and uses base64-encoded serialized task structures for command execution.
Affected Systems
- Windows OS
- .NET Framework
- Zoom Desktop Client
Attack Chain
The attack begins with victims downloading a ZIP archive via phishing links or SEO-poisoned search results. Execution relies heavily on AppDomain Hijacking, where a legitimate executable loads a malicious DLL (e.g., uevmonitor.dll or InitInstall.dll) via a crafted .config file. In the Zoom lure campaign, the malware hijacks a legitimate Zoom scheduled task for persistence before using AppDomain Hijacking again to load the final MiniFast backdoor. MiniFast then communicates with its C2 server via JSON over HTTP to receive and execute base64-encoded commands.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
The article does not provide ready-to-use detection rules, but offers detailed behavioral indicators, C2 URI structures, and file paths suitable for custom rule creation.
Detection Engineering Assessment
EDR Visibility: High — EDR solutions can detect AppDomain Hijacking by monitoring for unexpected module loads by .NET applications, as well as the creation or modification of scheduled tasks and unusual child processes spawned by update.exe. Network Visibility: Medium — While the C2 traffic uses standard HTTP POST/GET requests, the specific URI patterns (/rg, /agent/init, /agent/poll?token=) and the hardcoded Chrome User-Agent can be fingerprinted if SSL inspection is enabled. Detection Difficulty: Moderate — The use of legitimate signed binaries and AppDomain Hijacking helps the malware blend in, but the specific process ancestry checks (svchost.exe -> update.exe) and predictable C2 URIs provide solid detection opportunities.
Required Log Sources
- Process Creation (Event ID 4688 / Sysmon 1)
- Image Loaded (Sysmon 7)
- Scheduled Task Creation/Modification (Event ID 4698, 4702)
- Network Connections (Sysmon 3)
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Hunt for legitimate .NET executables loading unexpected DLLs from the same directory, particularly when accompanied by a .config file. | Image Loaded (Sysmon Event ID 7) and File Creation (Sysmon Event ID 11) | Execution / Defense Evasion | Low to Medium |
| Hunt for modifications to the 'ZoomUpdateTaskUser-<SID>' scheduled task where the executed binary is changed or points to a non-standard location. | Scheduled Task Logs (Event ID 4702) | Persistence | Low |
| Hunt for network connections to URIs ending in '/rg', '/agent/init', or '/agent/poll?token=' originating from processes named update.exe. | Proxy/Web Gateway Logs or EDR Network Events | Command and Control | Low |
Control Gaps
- Lack of SSL inspection may hide C2 URI patterns
- Over-reliance on digital signatures for execution trust
Key Behavioral Indicators
- Process ancestry: svchost.exe spawning update.exe
- Presence of .config files named after legitimate executables in user directories
- Hardcoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/146.0.0.0 Safari/537.36
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Verify against your organization's incident response runbook and team escalation paths before acting.
- Consider blocking the provided domains and IP addresses at your perimeter firewalls and web proxies.
- Evaluate whether to search endpoint telemetry for the presence of the identified SHA256 hashes and file names (e.g., uevmonitor.dll, UpdateChecker.dll).
Infrastructure Hardening
- If supported by your proxy, consider implementing SSL inspection to detect specific C2 URI patterns.
- Evaluate restricting the execution of unsigned or untrusted DLLs from user-writable directories.
User Protection
- Consider deploying EDR rules to monitor for AppDomain Hijacking indicators, such as unexpected .config files alongside executables.
- If applicable, restrict users from downloading software from unverified third-party websites to mitigate SEO poisoning risks.
Security Awareness
- Consider updating security awareness training to highlight the risks of downloading software from search engine results rather than official vendor sites.
- Evaluate reminding employees to be cautious of unsolicited job offers or meeting invitations containing ZIP attachments.
MITRE ATT&CK Mapping
- T1574.014 - Hijack Execution Flow: AppDomain Manager Hijacking
- T1053.005 - Scheduled Task/Job: Scheduled Task
- T1566.001 - Phishing: Spearphishing Attachment
- T1189 - Drive-by Compromise
- T1071.001 - Application Layer Protocol: Web Protocols
- T1140 - Deobfuscate/Decode Files or Information
- T1562.001 - Impair Defenses: Disable or Modify Tools
Additional IOCs
- Domains:
business-startup[.]azurewebsites[[.]]net- Attacker-controlled subdomain.businessstartup[.]azurewebsites[[.]]net- Attacker-controlled subdomain.buisness-centeral[.]azurewebsites[[.]]net- Attacker-controlled subdomain.buisness-centeral-transportation[.]azurewebsites[[.]]net- Attacker-controlled subdomain.buisness-centeral-transportation[[.]]com- Attacker-controlled domain.licencemanagers[.]azurewebsites[[.]]net- Attacker-controlled subdomain.licencesupporting[.]azurewebsites[[.]]net- Attacker-controlled subdomain.peerdistsvcmanagers[.]azurewebsites[[.]]net- Attacker-controlled subdomain.nanomatrix[.]azurewebsites[[.]]net- Attacker-controlled subdomain.PremierHealthAdvisory[[.]]com- Attacker-controlled domain.PremierHealthAdvisory[[.]]azurewebsites[.]net- Attacker-controlled subdomain.Premier-HealthAdvisory[[.]]azurewebsites[.]net- Attacker-controlled subdomain.ramiltonsfinance[[.]]com- Attacker-controlled domain.ramiltonsfinance[.]azurewebsites[[.]]net- Attacker-controlled subdomain.ramiltons-finance[.]azurewebsites[[.]]net- Attacker-controlled subdomain.globalitconsultants[.]azurewebsites[[.]]net- Attacker-controlled subdomain.globalit-consultants[.]azurewebsites[[.]]net- Attacker-controlled subdomain.global-it-consultants[.]azurewebsites[[.]]net- Attacker-controlled subdomain.global-it-checkers[.]azurewebsites[[.]]net- Attacker-controlled subdomain.global-it-checkbusiness[.]azurewebsites[[.]]net- Attacker-controlled subdomain.global-check-itbusiness[.]azurewebsites[[.]]net- Attacker-controlled subdomain.global-check-business-it[.]azurewebsites[[.]]net- Attacker-controlled subdomain.globalbusiness-checkers-it[.]azurewebsites[[.]]net- Attacker-controlled subdomain.
- File Hashes:
10fd541674adadfbba99b54280f7e59732746faf2b10ce68521866f737f1e46d(SHA256) - Malware payload associated with Nimbus Manticore.eee657ffdb2af8ed6412221e7d5fbf4f5742f2ac2c88f43f12db46af0697de71(SHA256) - Malware payload associated with Nimbus Manticore.781605ce9d4a9869e846f6c9657d71437cb6240ab27ffbc4cd550c0e06996690(SHA256) - Malware payload associated with Nimbus Manticore.2c214494fd0bad31473ca8adce78a4f50847876584571e66aadeae70827ec2dc(SHA256) - Malware payload associated with Nimbus Manticore.f08b17856616d66492a24dced27f788e235f35f42fa7cd10f315000d3a2f4c03(SHA256) - Malware payload associated with Nimbus Manticore.a57ffb819fe8d98ff925c5d7b239598fe302acf5a13193d7a535040a71298fdf(SHA256) - Malware payload associated with Nimbus Manticore.63d0d3c4a7f71bdbca720903d6a99b832089cc093c64d2938e7e001e56c17ab4(SHA256) - Malware payload associated with Nimbus Manticore.74882085db2088356ed7f72f01e0404a0a98cda88ef56fb15ce74c1f36b26d27(SHA256) - Malware payload associated with Nimbus Manticore.bc3b44154518c5794ce639108e7b9c5fecb0c189607a26de1aaed518d890c7ad(SHA256) - Malware payload associated with Nimbus Manticore.ecaf493c320d201d285ef5f61d75744216e47cf1115b4af528f9a78883cc446e(SHA256) - Malware payload associated with Nimbus Manticore.44f4f7aca7f1d9bfdaf7b3736934cbe19f851a707662f8f0b0c49b383e054250(SHA256) - Malware payload associated with Nimbus Manticore.0db36a04d304ad96f9e6f97b531934594cd95a5cea9ff2c9af249201089dc864(SHA256) - Malware payload associated with Nimbus Manticore.485f182f7b74ea4013b2539275a95d21e3a9bf0082c331937af9353a324b36f3(SHA256) - Malware payload associated with Nimbus Manticore.64530d7e6ee30e4a66d9eeed6b8595c33fd72f5f73409133ca40539e5695df4c(SHA256) - Malware payload associated with Nimbus Manticore.332ba2f0297dfb1599adecc3e9067893e7cf243aa23aedce4906a4c480574c17(SHA256) - Malware payload associated with Nimbus Manticore.9e4a658e6d831c9e9bdfe11884a75b7c64812ed0a80e8495ddf6b316505acac1(SHA256) - Malware payload associated with Nimbus Manticore.43dc62cef52ebdd69e79f10015b3e13890f26c058325c0ff139c70f8d8eadcfa(SHA256) - Malware payload associated with Nimbus Manticore.8808c794c24367438f183e4be941876f1d3ecd0c8d2eb43b10d2380841d2283b(SHA256) - Malware payload associated with Nimbus Manticore.5c3362d20229597d11380f56d1f2eb39647fb6afad7be8392a7abcd18dff12f8(SHA256) - Malware payload associated with Nimbus Manticore.0291ef318576953f7f3fe287e7775ed1d7c3206119dc7b9cd6d85c02779e6e40(SHA256) - Malware payload associated with Nimbus Manticore.d4a7e9f107fe40c1a5d0139c6c6e25bf6bf57f61feff090bee28f476bb3cc3c2(SHA256) - Malware payload associated with Nimbus Manticore.38bd137c672bd58d08c4f0502f993a6561e2c3411773d1ae57ee0151a0a9d11d(SHA256) - Malware payload associated with Nimbus Manticore.f54cd38632ac9da3af3533ae93e92625cbcb04df521dbf1b6acfaa81218f9e8c(SHA256) - Malware payload associated with Nimbus Manticore.b19e06da580cf91691eda066ac9ee4b09c6e5dc26c367af12660fe1f9306eec4(SHA256) - Malware payload associated with Nimbus Manticore.9cf029daca89523d917dafed0568d11d00e45ec96b5b90b4a1f7fd4018c7da84(SHA256) - Malware payload associated with Nimbus Manticore.a13ba3c5aff46e9daf2d23df4b3e3d49dc7236c207c56f0a1433051f3450d441(SHA256) - Malware payload associated with Nimbus Manticore.dfa1e3137a032ee8561a1cd5e1a0f71a10bebb36aef7c336c878638a9c1239ee(SHA256) - Malware payload associated with Nimbus Manticore.
- File Paths:
C:\Users\<USER>\AppData\Local\Packages\- Directory where the first-stage loader extracts and deploys the next-stage payload.C:\Users\<USER>\AppData\Local\Zoom\bin\update\- Directory where the second-stage files are copied during the Zoom installer infection chain.
- Command Lines:
- Purpose: Execute shell commands received from the C2 server | Tools:
cmd.exe| Stage: Execution |cmd.exe /c
- Purpose: Execute shell commands received from the C2 server | Tools:
- Other:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/146.0.0.0 Safari/537.36- Hardcoded User-Agent string used by the MiniFast backdoor for C2 communication.