Blog

Nimbus Manticore: How an Iran-aligned APT weaponizes fake job portals and DLL side-loading


Shana Buhaisa P Security Researcher Intern

What is Nimbus Manticore?

Nimbus Manticore is a highly sophisticated threat actor group, assumed to be aligned with Iranian state interests. The group has operational overlap with UNC1549, Smoke Sandstorm, and the "Iranian Dream Job" campaigns, and primarily targets defence contractors, aerospace suppliers, and telecommunications organizations across Europe and the Middle East.

The group is known for using highly realistic fake job portals to lure victims, delivering ZIP archives that executes DLL side-loading to run hidden malware such as MiniJunk (a highly obfuscated backdoor) and MiniBrowse (a credential stealer). Once inside, they persist quietly, collect credentials, and exfiltrate sensitive data.
To initiate initial access, Nimbus Manticore group conducts spear-phishing campaigns that impersonate legitimate recruiters and redirect selected individuals to convincing fake career portals. Each target receives a unique URL and a set login credentials, allowing the attackers to monitor engagement and control who receives the payload. This delivery method, combined with detailed reconnaissance and social engineering pretexts, demonstrates a high level of OPSEC and sophistication.

Why this matters

Organizations in defense and telecom sectors manage classified projects, research, and sensitive operational data. If such information is compromised it can lead to a number of incidents, which includes:

  • Long-term espionage and surveillance
  • Strategic leaks of military or industrial secrets
  • Disruption or manipulation of supply chain

Nimbus Manticore is a strategic intelligence-gathering threat, one that prioritizes stealth and persistence over quick financial gain and benefits. Their approach demonstrate how social engineering and low-level system abuse can bypass even mature security defenses.

Attack Methodology

Initial Access? Career-Themed Spear-Phishing

Initial access begins with highly targeted phishing campaigns using career-themed social engineering. Threat actors use multiple pretexting methods, including professional recruitment impersonation via LinkedIn and fake HR specialists who direct victims to alternative communication platforms. The attacker establishes fake job portals made to appear as legitimate hiring sites for major aerospace and defence companies including Boeing, Airbus, Rheinmetall, and flydubai.

These fraudulent career portals are usually built using React templates and hosted behind Cloudflare to obfuscate the actual server infrastructure. The domains often follow predictable naming patterns with "career" themed subdomains. Once the victim logs in using credentials that were shared earlier by the fake recruiter, the site sends encoded login details through a /login-user API endpoint. Shortly after this, the victim is prompted to download a ZIP file that is presented as hiring-related software. In reality, this archive contains malicious payloads that lead to further compromise of the system.

Given below an example fake website imitating Boeing Careers, which deliver malicious archive/ZIP files after user authentication:

Delivery and Initial Execution: Multi-Stage DLL Sideloading

The real innovation in Nimbus Manticore's attack chain is its use of multi-stage DLL sideloading, an execution technique that abuses the Windows DLL search order by placing a malicious Dynamic Link Library (DLL) alongside a legitimate executable so it is loaded first.

The attack follows these steps:

  1. A legitimate Windows executable, Setup.exe from the malicious ZIP archive is executed by the victim
  2. Setup.exe sideloads the malicious userenv.dll from the same archive directory
  3. The malicious userenv.dll loader uses low-level NT API calls to execute SenseSampleUploader.exe, a legitimate Windows Defender Advanced Threat Protection component
  4. SenseSampleUploader.exe is vulnerable to DLL hijacking and loads xmllite.dll from a relative path, which the attacker controls by manipulating the process's DllPath parameter via RTL_USER_PROCESS_PARAMETERS

Below is the sample of ZIP file, that represents the initial payload delivered through fake hiring portals. The archive contains a legitimate executable (setup.exe) together with malicious DLLs such as xmllite.dll and iviewers.dll, enabling DLL side-loading during execution.


The technical sophistication lies in how the malware modifies process execution parameters using undocumented low-level API functions. By manipulating the DllPath field during process creation via RtlCreateProcessParameters and RtlCreateUserProcess, the threat actor forces the Windows loader to search for DLLs rather than standard system paths. This technique bypasses traditional DLL search order protections and leverages legitimate system executables in the attack chain.

xmllite.dll

To better understand the operational context of the xmllite.dll payload, we analyzed its relationship graph in VirusTotal. The graph highlights execution parents, dropped files, contacted infrastructure, and association with other Nimbus Manticore artifacts.

Persistence Establishment

Following successful DLL loading, the xmllite.dll payload establishes persistence through multiple methods.

  • Creates a working directory at %AppData%\Local\Microsoft\MigAutoPlay\
  • Copies the main backdoor (userenv.dll) to the persistence directory
  • Copies the legitimate executable to the same location
  • Adds auto-run registry keys for automatic execution on system startup
  • Creates scheduled tasks to establish multiple execution paths.

This persistence strategy ensures continued access even after system restarts and provides multiple execution pathways to avoid removal attempts.

Malware Toolkit and Technical Capabilities

MiniJunk Backdoor

MiniJunk is a heavily obfuscated backdoor written in C++. Upon loading, it dynamically resolves required Windows APIs and collects system IDs - the hostname name and the DOMAIN\username string for that host.
If running as MigAutoPlay.exe, it immediately hooks the ExitProcess API so that calls to terminate are diverted to a sleep loop. A main thread is then spawned to handle networking and there comes the Command and control logic.

MiniJunk's network communication is not exactly unencrypted but encoded. It encodes outbound data by reversing bytes and then reversing the string. Static strings and URLs within the binary are encrypted per-string with XOR, each string is XORed with a per-string key. The code also contains extensive junk instructions and bogus branches (inserted via custom LLVM-based obfuscation) to inflate the size and confuse disassembly. This sample is also code-signed with a legitimate SSL.com certificate and padded with inert data, tactics that dramatically reduce Anti-Virus detection by hitting scanner time and size limits.
This is a sample of the MiniJunk backdoor, iviewers.dll. When analyzed on VirusTotal, 40 out of 72 security vendors flagged the file as malicious, with most detections classifying it as a trojan and associating it with Nimbus Manticore related activity.



Evasion and Anti-Analysis: MiniJunk avoids detection by multiple means. It uses valid digital signatures (SSL.com issued certificates) and bloated code to slip past AV engines. The string obfuscation and control-flow tricks make static analysis extremely difficult. In addition, hooking ExitProcess keeps the process alive longer. Other typical evasion (like detecting debuggers or disabling services) was not explicitly reported, most evasion here depends on stealth (signed binaries, living in memory) and not tripping detections.

MiniBrowse Stealer

MiniBrowse is a lightweight credential stealer delivered alongside MiniJunk. It comes in two variants (targeting Chrome or Edge) as a DLL meant to be injected into the browser process. Once executed, it first collects system identifiers (username and domain) and sends them to C2 server as a JSON payload.

Unusually, the malware requires the C2 to respond with a non 200 HTTP status for it to proceed, if the response code is 200, MiniBrowse aborts. Upon receiving a satisfying response, MiniBrowse scans for the browser's local credential stores (e.g. Chrome's "Login Data" SQLite file and Edge's equivalent, located under %LOCALAPPDATA%\Google\Chrome\User Data\ or %LOCALAPPDATA%\Microsoft\Edge\User Data\).
It opens these files and reads the encrypted passwords, typically it would use the Windows CryptoAPI (DPAPI) to decrypt Chrome/Edge credentials. The stolen credential entries (usernames, URLs, passwords) are then exfiltrated.

Command and Control

MiniJunk maintains redundancy through multiple hardcoded C2 servers, usually between three to five servers per sample. If one C2 endpoint becomes unavailable, the malware automatically fails over to the next server in the list. Communication occurs via standard HTTPS requests using the Windows API, with responses encoded in a similar manner to outbound data.

Motivation, Strategic Purpose and Impact

Understanding why Nimbus Manticore operates helps clarify how dangerous they truly are. Primarily, this Iran-aligned threat group is motivated by espionage and intelligence gathering - targeting the defense, aerospace, and telecommunications sectors that hold sensitive national and industrial information. Their objective is not quick profit, it's a long-term strategic advantage. They aim for persistent, covert access to victim environments, allowing them to continuously monitor communications, steal data, and observe operations over time.

Most of their campaigns appear to be aligned with Iranian IRGC priorities, especially during periods of geopolitical tension. Additionally, we must recognize the similarity between Nimbus Manticore's tactics and state-sponsored motivations, focused on acquiring defense knowledge, proprietary technology advancements, and access to organizations who are regionally significant.

The risks are severe:

  • Theft of sensitive data such as internal documents, designs, or intellectual property.
  • Credential compromise that enables deeper penetration into networks and lateral movement.
  • Stealthy persistence enabling long-term espionage, surveillance, or even sabotage.
  • Expanded compromise of supply chains or partner networks, amplifying the overall impact.

In short, Nimbus Manticore's motivation and tactics show they are not after headlines, they are after influence, access, and information dominance.

How do we defend?

AreaRecommendations
PhishingTrain employees to identify phishing emails. Deploy proper email security controls.
Web Sites and DownloadsBe cautious with login pages and job portals. Avoid downloading files from unverified sources. Strengthen EDR and Web security products to detect malicious ZIPs and installers.
Endpoint Protection / Malware DetectionUse next-gen antivirus or endpoint detection and response (EDR) tools that detect behavior. Look for abnormal DLL loading, execution via unauthorized paths. Monitor for side-loaded DLLs.
System and Application HardeningImplement least privilege, users should not run as admin. Limit what programs can load DLLs from where. Use application whitelisting. Monitor and control scheduled tasks.
Network MonitoringWatch outbound connections to unknown C2 servers. Monitor for unusual HTTPS traffic. Check for anomalies in HTTP responses (eg: when HTTP responses are used unconventionally, as MiniBrowse uses some checks on responses not being 200).
Code Signing / Certificate ManagementBe aware that just because software is signed does not mean it's safe. Checking the validity and trust of certificates is important.
Threat Intelligence / SharingUse intelligence feeds to keep up with new malware variants, domains, hashes. Share with peers or CERTs.

Conclusion

Nimbus Manticore demonstrates how modern APTs are using deception and technical exploitation to achieve strategic objectives. By impersonate as recruiters, abusing trusted Windows mechanisms, and deploying stealthy malware, this threat actor group highlights the importance of behavior-based detection, strong user awareness, and proactive threat intelligence.
Organizations in the targeted sectors should strengthen their defensive posture, implement comprehensive threat intelligence monitoring, and maintain rapid incident response capabilities to mitigate the risks posed by this highly capable and persistent adversary group.

Sample IOCs:

Domain names:

  • airbus[.]careers-portal[.]org
  • airbus[.]careersworld[.]org
  • airbus[.]germanywork[.]org
  • airbus[.]global-careers[.]com
  • airbus[.]usa-careers[.]com
  • boeing-careers[.]com
  • rheinmetall[.]careers-hub[.]org
  • rheinmetall[.]careersworld[.]org
  • rheinmetall[.]gocareers[.]org
  • rheinmetall[.]theworldcareers[.]com
  • rheinmetallcareer[.]com
  • rheinmetallcareer[.]org
  • careers-hub[.]org
  • careers-portal[.]org
  • careersworld[.]org
  • global-careers[.]com
  • gocareers[.]org
  • theworldcareers[.]com
  • usa-careers[.]com
  • germanywork[.]org
  • flydubaicareers[.]ae[.]org
  • activehealthlab[.]azurewebsites[.]net
  • airmdsolutions[.]azurewebsites[.]net
  • asylimed[.]azurewebsites[.]net
  • clinichaven[.]azurewebsites[.]net
  • digicura[.]azurewebsites[.]net
  • healsanctum[.]azurewebsites[.]net
  • medical-deepresearch[.]azurewebsites[.]net
  • mentalhealth-support-portal[.]azurewebsites[.]net
  • nanobreathe[.]azurewebsites[.]net
  • patientcare-portal[.]azurewebsites[.]net
  • telehealthconnectpro[.]azurewebsites[.]net
  • virtualcliniczone[.]azurewebsites[.]net
  • arabiccountriestalent[.]com
  • arabiccountriestalent[.]azurewebsites[.]net
  • arabiccountriestalenthr[.]azurewebsites[.]net
  • arabiccountriestalents[.]azurewebsites[.]net
  • arabiccountriestalentshr[.]azurewebsites[.]net
  • cloudaskquestionanswers[.]azurewebsites[.]net
  • cloudaskingquestions[.]eastus[.]cloudapp[.]azure[.]com
  • backsrv66[.]azurewebsites[.]net
  • check-backup-service[.]azurewebsites[.]net
  • exchtestchecking[.]azurewebsites[.]net
  • focusfusion[.]eastus[.]cloudapp[.]azure[.]com
  • tacticalsnap[.]eastus[.]cloudapp[.]azure[.]com

Malware Hashes:

  • 054483046c9f593114bc3ddc3613f71af6b30d2e4b7e7faec1f26e72ae6d7669
  • 061c28a9cf06c9f338655a520d13d9b0373ba9826a2759f989985713b5a4ba2b
  • 0b2c137ef9087cb4635e110f8e12bb0ed43b6d6e30c62d1f880db20778b73c9a
  • 0e4ff052250ade1edaab87de194e87a9afeff903695799bcbc3571918b131100
  • 1b629042b5f08b7460975b5ecabc5b195fcbdf76ea50416f512a3ae7a677614a
  • 23c0b4f1733284934c071df2bf953a1a894bb77c84cff71d9bfcf80ce3dc4c16
  • 3b4667af3a3e6ed905ae73683ee78d2c608a00e566ae446003da47947320097f
  • 3b58fd0c0ef8a42226be4d26a64235da059986ec7f5990d5c50d47b7a6cfadcd
  • 41d60b7090607e0d4048a3317b45ec7af637d27e5c3e6e89ea8bdcad62c15bf9
  • 4260328c81e13a65a081be30958d94b945fea6f2a483d051c52537798b100c69
  • 4da158293f93db27906e364a33e5adf8de07a97edaba052d4a9c1c3c3a7f234d
  • 53ff76014f650b3180bc87a23d40dc861a005f47a6977cb2fba8907259c3cf7a
  • 5985bf904c546c2474cbf94d6d6b2a18a4c82a1407c23a5a5eca3cd828f03826
  • 5d832f1da0c7e07927dcf72d6a6f011bfc7737dc34f39c561d1457af83e04e70
  • 6780116ec3eb7d26cf721607e14f352957a495d97d74234aade67adbdc3ed339
  • 7c77865f27b8f749b7df805ee76cf6e4575cbe0c4d9c29b75f8260210a802fce
  • 8e7771ed1126b79c9a6a1093b2598282221cad8524c061943185272fbe58142d
  • 954de96c7fcc84fb062ca1e68831ae5745cf091ef5fb2cb2622edf2358e749e0
  • 95d246e4956ad5e6b167a3d9d939542d6d80ec7301f337e00bb109cc220432cf
  • 9b186530f291f0e6ebc981399c956e1de3ba26b0315b945a263250c06831f281
  • 9ec7899729aac48481272d4b305cefffa7799dcdad88d02278ee14315a0a8cc1
  • a37d36ade863966fb8520ea819b1fd580bc13314fac6e73cb62f74192021dab9
  • a4f5251c81f080d80d1f75ad4cc8f5bc751e7c6df5addcfca268d59107737bd0
  • afe679de1a84301048ce1313a057af456e7ee055519b3693654bbb7312083876
  • b405ae67c4ad4704c2ae33b2cf60f5b0ccdaff65c2ec44f5913664805d446c9b
  • b43487153219d960b585c5e3ea5bb38f6ea04ec9830cca183eb39ccc95d15793
  • b9b3ba39dbb6f4da3ed492140ffc167bde5dee005a35228ce156bed413af622d
  • bc9f2abce42141329b2ecd0bf5d63e329a657a0d7f33ccdf78b87cf4e172fbd1
  • c22b12d8b1e21468ed5d163efbf7fee306e357053d454e1683ddc3fe14d25db5
  • cf0c50670102e7fc6499e8d912ce1f5bd389fad5358d5cae53884593c337ac2e
  • d2db5b9b554470f5e9ad26f37b6b3f4f3dae336b3deea3f189933d007c17e3d8
  • e69c7ea1301e8d723f775ee911900fbf7caf8dcd9c85728f178f0703c4e6c5c0
  • e77b7ec4ace252d37956d6a68663692e6bde90cdbbb07c1b8990bfaa311ecfb2
  • f54fccb26a6f65de0d0e09324c84e8d85e7549d4d04e0aa81e4c7b1ae2f3c0f8
  • f8a1c69c03002222980963a5d50ab9257bc4a1f2f486c3e7912d75558432be88
  • ffeacef025ef32ad092eea4761e4eec3c96d4ac46682a0ae15c9303b5c654e3e


Get the full report

We have a document here with high-levl pointers on Nimbus Manticore.

Download Full Report (PDF)