Unit 42 Tracks Iranian APT Screening Serpens' 2026 Espionage Campaigns Targeting Tech and Defense Sectors

Iranian APT Screening Serpens Unleashes New RATs in Espionage Campaign Against US, Israel, and UAE

HIGH
May 22, 2026
6m read
Threat ActorMalwareCyberattack

Related Entities

Threat Actors

Screening Serpens UNC1549Smoke SandstormIranian Dream Job

Organizations

Unit 42 Palo Alto Networks Check Point Research

Products & Tech

Other

MiniJunkMiniUpdateIranUnited StatesIsraelUnited Arab Emirates

Full Report

Executive Summary

Between February and April 2026, the Iran-nexus Advanced Persistent Threat (APT) group Screening Serpens (also known as UNC1549 and Smoke Sandstorm) launched a series of sophisticated cyberespionage campaigns. The attacks targeted high-value entities in the technology, aerospace, and defense sectors across the United States, Israel, and the United Arab Emirates. Unit 42 researchers observed a significant evolution in the group's tactics, techniques, and procedures (TTPs), highlighted by the use of AppDomainManager hijacking to disable security controls in .NET applications. The group deployed six new Remote Access Trojan (RAT) variants, categorized into two new malware families named MiniUpdate and MiniJunk V2, demonstrating a continuous cycle of development and operational refinement.


Threat Overview

The campaigns, occurring from mid-February through April 2026, coincide with the timing of a regional conflict that began on February 28, 2026. Screening Serpens has maintained a high operational tempo, leveraging targeted social engineering as its primary initial access vector. The group impersonates trusted brands and hiring platforms, sending personalized recruitment lures to professionals in their target sectors.

The infection chain typically begins with a malicious archive file (e.g., Hiring Portal.zip) containing a payload that uses T1574.002 - DLL Sideloading for execution. A key innovation is the use of AppDomainManager hijacking, a technique that manipulates the initialization of .NET applications to disable their security features, allowing the RATs to operate unimpeded. The actor routes command and control (C2) traffic through a set of unique, target-specific domains, many hosted on Azure, to enhance operational resilience and avoid cross-contamination between campaigns.


Technical Analysis

Screening Serpens's recent operations showcase a marked increase in technical sophistication. The core of their new toolkit consists of two malware families, MiniUpdate and MiniJunk V2.

AppDomainManager Hijacking

The most critical evolution is the group's use of AppDomainManager hijacking. This technique involves modifying a legitimate .NET application's configuration file (.config). By adding specific XML tags (<appDomainManagerAssembly> and <appDomainManagerType>), the attacker can force the .NET Common Language Runtime (CLR) to load a malicious assembly during the application's startup process. This malicious assembly can then programmatically disable security features like Antimalware Scan Interface (AMSI), effectively blinding endpoint security products before the main application code even runs.

Malware Families: MiniUpdate and MiniJunk V2

  • MiniUpdate: Named after the internal filename UpdateChecker.dll, this family was deployed in two coordinated waves against targets in the U.S., Israel, and the UAE. Analysis shows continuous refinement, with later variants including features like the ability to exfiltrate files in chunks. The primary infection vector was an archive file delivered via spear phishing.
  • MiniJunk V2: This family builds on previous versions of the actor's tooling. Like MiniUpdate, it is delivered via spear phishing and uses DLL sideloading.

Both families establish persistence and communicate with C2 servers over standard web protocols (T1071.001 - Web Protocols). The C2 domains are dedicated per target and variant, demonstrating a high degree of operational planning to hinder detection and attribution.

MITRE ATT&CK TTPs Observed

Tactic
Initial Access
Technique ID
T1566.001
Technique Name
Spearphishing Attachment
Tactic
Execution
Technique ID
T1204.002
Technique Name
Malicious File
Tactic
Persistence
Technique ID
T1547.001
Technique Name
Registry Run Keys / Startup Folder
Tactic
Defense Evasion
Technique ID
T1574.002
Technique Name
DLL Sideloading
Tactic
Defense Evasion
Technique ID
T1140
Technique Name
Deobfuscate/Decode Files or Information
Tactic
Defense Evasion
Technique ID
T1562.001
Technique Name
Disable or Modify Tools (via AppDomainManager)
Tactic
Command and Control
Technique ID
T1071.001
Technique Name
Web Protocols
Tactic
Exfiltration
Technique ID
T1041
Technique Name
Exfiltration Over C2 Channel

Impact Assessment

The primary objective of these campaigns is cyberespionage, aligned with the strategic interests of the Iranian government. By targeting aerospace, defense manufacturing, and telecommunications organizations, Screening Serpens seeks to acquire sensitive intellectual property, defense secrets, and other confidential information. The compromise of professionals within these high-value sectors can lead to long-term strategic losses for the affected nations and companies. The use of advanced defense evasion techniques like AppDomainManager hijacking indicates that the group is capable of bypassing standard security controls, increasing the likelihood of a successful and prolonged intrusion.


IOCs — Directly from Articles

Type
file_name
Value
Hiring Portal.zip
Description
Known artifact name used in Screening Serpens campaigns.
Type
file_name
Value
UpdateChecker.dll
Description
Internal name for the MiniUpdate malware payload.

The source article did not provide specific hash values, IP addresses, or C2 domains.


Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to detect activity related to this threat:

Type
file_path
Value/Pattern
*.exe.config
Description & Context
Hunt for modifications: Search for recently modified .NET application configuration files. Context: AppDomainManager hijacking requires altering these files.
Type
string_pattern
Value/Pattern
<appDomainManagerAssembly>
Description & Context
Detect in config files: Scan .config files for the presence of this XML element, which is used to specify the malicious assembly for AppDomainManager hijacking.
Type
process_name
Value/Pattern
MSBuild.exe
Description & Context
Monitor for abuse: Look for MSBuild.exe spawning suspicious child processes or making outbound network connections, as it can be abused to execute malicious code.
Type
network_traffic_pattern
Value/Pattern
Outbound connections to new Azure domains
Description & Context
Analyze network logs: Correlate process execution with outbound connections to newly registered domains hosted on Azure, especially from non-browser processes.

Detection & Response

  • Endpoint Detection (EDR):
    • Monitor for legitimate .NET applications (e.g., InstallUtil.exe, MSBuild.exe) spawning unusual child processes like cmd.exe or powershell.exe.
    • Create detection rules for modifications to .exe.config files, particularly the addition of the appDomainManager configuration elements. This can be achieved with File Integrity Monitoring (FIM).
    • Utilize D3FEND's Process Analysis to baseline normal process behavior and detect anomalies.
  • Log Analysis (SIEM):
    • Ingest Windows Event Logs, specifically Security Event ID 4688 (Process Creation) with command-line logging enabled, to hunt for suspicious execution chains.
    • Analyze web proxy and firewall logs for connections to newly registered or uncategorized domains, especially those hosted on cloud platforms like Azure.
  • Threat Hunting:
    • Proactively hunt for DLL sideloading opportunities in your environment by identifying applications that load DLLs from user-writable directories.
    • Search for files named UpdateChecker.dll or similar variants outside of their expected application directories.

Mitigation

  • User Training (M1017): Educate employees, especially those in high-value roles, to recognize and report sophisticated spear phishing and social engineering attempts, particularly those involving job offers.
  • Application Control (M1038): Implement application allowlisting solutions to prevent the execution of unauthorized executables and DLLs. This can directly counter the DLL sideloading technique.
  • Configuration Hardening (M1028): Enforce policies to restrict modifications to sensitive files, including application .config files in Program Files. Use file integrity monitoring to alert on unauthorized changes.
  • Network Segmentation (M1030): Segment the network to limit lateral movement and restrict outbound C2 traffic. Egress filtering should be used to block connections to known malicious or untrusted destinations.

Timeline of Events

1
February 17, 2026
A MiniJunk V2 family sample was uploaded, marking the start of the observed campaign preparations.
2
February 28, 2026
A regional conflict started in the Middle East, aligning with the timing of the APT campaigns.
3
March 26, 2026
A MiniUpdate family sample was uploaded, potentially targeting entities in the U.S. and Israel.
4
March 27, 2026
Another MiniJunk V2 family sample was uploaded.
5
April 15, 2026
A MiniUpdate family sample was uploaded, potentially targeting an entity in the UAE.
6
April 17, 2026
A MiniUpdate family sample was uploaded, potentially targeting another Middle Eastern entity.
7
May 22, 2026
This article was published

MITRE ATT&CK Mitigations

Training users to recognize and report phishing attempts is crucial, as social engineering is the primary initial access vector for this threat actor.

Implementing application allowlisting can prevent the execution of malicious DLLs and executables dropped by the attacker.

Mapped D3FEND Techniques:

Enable detailed logging and auditing of file modifications (especially for .config files) and process creation to detect TTPs like AppDomainManager hijacking.

Mapped D3FEND Techniques:

Segmenting the network can contain the threat actor's movement and limit the blast radius of an intrusion.

Mapped D3FEND Techniques:

Timeline of Events

1
February 17, 2026

A MiniJunk V2 family sample was uploaded, marking the start of the observed campaign preparations.

2
February 28, 2026

A regional conflict started in the Middle East, aligning with the timing of the APT campaigns.

3
March 26, 2026

A MiniUpdate family sample was uploaded, potentially targeting entities in the U.S. and Israel.

4
March 27, 2026

Another MiniJunk V2 family sample was uploaded.

5
April 15, 2026

A MiniUpdate family sample was uploaded, potentially targeting an entity in the UAE.

6
April 17, 2026

A MiniUpdate family sample was uploaded, potentially targeting another Middle Eastern entity.

Sources & References

Tracking Iranian APT Screening Serpens’ 2026 Espionage Campaigns
Unit 42 (unit42.paloaltonetworks.com) May 21, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Screening SerpensIranAPTRATAppDomainManagerDLL SideloadingEspionageUNC1549MiniUpdateMiniJunk

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.