INTELLIGENCE REPORT — APT34

TLP:CLEAR | Mixed audience | Updated: March 2026


1. IDENTIFICATION & ATTRIBUTION

Designations: OilRig (CrowdStrike), Helix Kitten (CrowdStrike), APT34 (Mandiant/Google), IRN2 (SecureWorks), COBALT GYPSY (SecureWorks), Crambus (Symantec), Earth Simnavaz (Trend Micro), EUROPIUM (Microsoft)

Origin: Iran Suspected sponsor: Iranian Ministry of Intelligence (MOIS — Vezarat-e Ettela’at va Amniat-e Keshvar) Sophistication level: High (confirmed APT, persistent operations since 2012) Motivation: Strategic espionage, geopolitical intelligence collection, occasional sabotage Targeted sectors: Energy (oil & gas), finance, telecommunications, governments, defense, chemicals, transportation

Geographic scope: Middle East (priority: Saudi Arabia, UAE, Kuwait, Iraq, Jordan, Bahrain), Europe, North America, South Asia


2. INFRASTRUCTURE & TTPs

Infrastructure

APT34 operates a heavily segmented infrastructure that is regularly renewed:

  • Primary C2: DNS tunneling (DNS protocol used as C2 exfiltration/command channel — distinctive group signature)
  • Secondary C2: HTTPS toward compromised legitimate domains or registered domains impersonating known entities (typosquatting)
  • Hosting: VPS rented through resellers (avoiding direct attribution), infrastructure partially shared with APT33
  • Frequent registrars: Namecheap, Njalla, anonymizing services
  • Pivot via legitimate networks: Use of compromised LinkedIn, Exchange, and OWA accounts for initial persistence

TTPs (MITRE ATT&CK)

PhaseTechniqueID
ReconnaissanceOSINT collection via LinkedIn, targeted spear-phishingT1589, T1598
Initial AccessSpear-phishing attachments (Office macros, LNK), VPN/OWA exploitationT1566.001, T1190
ExecutionPowerShell, VBScript, DNS requestsT1059.001, T1059.005
PersistenceScheduled Tasks, Web Shell, registry modificationT1053.005, T1505.003
Defense EvasionLiving-off-the-land, PowerShell obfuscation, signed binary proxyT1027, T1218
Credential AccessCredential dumping (Mimikatz), OWA/Exchange harvestingT1003, T1114
Lateral MovementPass-the-Hash, RDP, SMBT1550.002, T1021.001
ExfiltrationDNS tunneling, HTTPS, email via compromised accountsT1048.001, T1041
C2DNS over HTTPS (DoH), legitimate application protocolsT1071.004, T1071.001

3. MALWARES & TOOLING

Internally developed tools

POWRUNER

  • Type: PowerShell backdoor
  • Function: Remote command execution, system collection
  • C2 channel: DNS tunneling
  • Detection: Abnormally long DNS queries (labels > 63 characters), high frequency of TXT requests

BONDUPDATER

  • Type: PowerShell backdoor
  • Function: Payload download/execution, persistence
  • Specifics: Uses DNS TXT records to receive C2 commands
  • Family: Used in conjunction with POWRUNER

TWOFACE / SEASHARPEE

  • Type: Web Shell (ASP.NET / ASPX)
  • Function: Persistent access on compromised Exchange/OWA servers
  • Deployment: Post-exploitation on exposed Exchange infrastructure

HYPERSHELL

  • Type: Perl Web Shell
  • Function: Backdoor on Linux servers

RAGERUNNER / SAITAMA

  • Type: .NET backdoor
  • Function: DNS-based exfiltration, C2 communication encoded in base64 within DNS labels
  • Campaign: Identified in 2022 targeting Jordanian government entities

MENORAH

  • Type: PowerShell backdoor
  • Function: System fingerprinting, file exfiltration, command execution
  • Campaign: Identified in 2023, Middle East targeting

VEATY / SPEARAL

  • Type: .NET malware (two distinct components)
  • Function: VEATY uses compromised email accounts as C2 channel (read/write in Exchange mailboxes), SPEARAL uses DNS tunneling
  • Campaign: Identified in 2024, targeting Iraq (government, telecoms)

Third-party tools used

  • Mimikatz (credential dumping)
  • CrackMapExec (lateral movement)
  • Plink / PuTTY (SSH tunneling)
  • ngrok (internal service exposure)
  • nbtscan (internal network reconnaissance)

4. CAMPAIGN HISTORY

PeriodCampaign / OperationTargetsVectorTooling
2012–2014Initial documented activityEnergy, Middle East governmentsSpear-phishingUnnamed custom tools
2016OilRig campaign v1Saudi organizations, financial sectorOffice macro spear-phishingPOWRUNER, BONDUPDATER
2017–2018Extended OilRig campaignsTelecoms, Gulf States governmentsOWA compromise, spear-phishingTWOFACE, SEASHARPEE, POWRUNER
2019Lab Dookhtegan tool leakSource code of JASON, HYPERSHELL, GLIMPSE published on Telegram
2019–2020Exchange/OWA campaignBanks, Middle East governmentsOWA exploitationTWOFACE, credential harvesting
2021–2022Jordan campaignGovernment entitiesSpear-phishingSAITAMA
2022–2023Extended Middle East campaignGovernments, energySpear-phishing, VPN exploitationMENORAH
2024Iraq campaignGovernment, telecoms, NGOsSpear-phishing, web shellVEATY, SPEARAL
2024–2025Earth Simnavaz (Trend Micro)UAE, Gulf StatesExchange exploitation, CVE-2024-30088 (Windows Kernel EoP).NET backdoor, ASPX web shell

Note: In 2019, the hacktivist group Lab Dookhtegan (likely backed by a rival state) published the source code of several APT34 tools and infrastructure data on Telegram, forcing the group to partially renew its arsenal.


5. INDICATORS OF COMPROMISE (IOCs)

The following IOCs are sourced from public reports. Operational relevance must be assessed against publication date — APT34 regularly rotates its infrastructure.

Characteristic DNS patterns

  • DNS queries with base64-encoded labels (abnormal length)
  • High-frequency DNS TXT queries toward unresolved domains
  • Subdomain pattern: [base64_data].[domain].com

Historical domains (public reports)

b.tzuri.me
dns.changeip.com
windowsupdater.com
microsoftapps.net
svnwork.com

Public malware hashes (SAITAMA)

SHA256: 687c5ce1fe1f8fb8ab1e1fb1b3e2d8c5b2eaf2d2e5e6c7a3b4f5e6d7c8b9a0f1

(symbolic hash — refer to Malwarebytes/ESET reports for verified hashes)

Abnormal User-Agents observed

python-requests/2.x
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)

Recommended real-time IOC sources


6. DETECTION & COUNTERMEASURES (MITRE ATT&CK)

Priority detection rules

DNS Tunneling (T1048.001 / T1071.004)

Detect:
- DNS queries with high label entropy (Shannon entropy > 3.5)
- Abnormally high DNS TXT query volume per endpoint
- DNS labels > 50 characters
- DNS TXT responses containing base64-encoded content
Tools: Zeek (dns.log), Suricata (DNS rules), Elastic SIEM

Web Shell (T1505.003)

Detect:
- Creation of .aspx/.php files in Exchange/OWA web directories
- w3wp.exe or httpd spawning cmd.exe / powershell.exe
- HTTP access to .aspx files not referenced in the application
Tools: Sysmon (Event ID 1, 11), EDR process tree analysis

Exchange Credential Harvesting (T1114)

Detect:
- OWA access from unusual IPs/ASNs
- Mailbox export via EWS (Exchange Web Services) outside legitimate processes
- Creation of mail forwarding rules to external addresses

Obfuscated PowerShell (T1059.001 / T1027)

Detect:
- PowerShell with -EncodedCommand encoding
- Invocation of [System.Reflection.Assembly]::Load
- Abnormal escape characters in scripts
Sigma rule: https://github.com/SigmaHQ/sigma (search OilRig)

Recommended countermeasures

  • DNS filtering: Deploy an inspection-capable DNS resolver (enterprise Pi-hole, Infoblox, Cisco Umbrella) — top priority against DNS tunneling
  • Exchange / OWA: Restrict EWS access to legitimate clients only, enable advanced Exchange audit logging
  • MFA: Enforce MFA on all exposed OWA/Exchange access (absolute priority)
  • Segmentation: Isolate Exchange servers from the rest of the network, restrict outbound DNS flows to authorized resolvers only
  • EDR: Enable PowerShell telemetry (ScriptBlock Logging, Module Logging, Transcription)
  • Threat Hunting: Proactive hunting on DNS tunneling patterns and unreferenced ASPX web shells

SOURCES

  1. Mandiant / Google — APT34 threat actor profile: https://www.mandiant.com/resources/insights/apt-groups
  2. MITRE ATT&CK — G0049 OilRig: https://attack.mitre.org/groups/G0049/
  3. CrowdStrike — Helix Kitten adversary profile: https://www.crowdstrike.com/adversaries/helix-kitten/
  4. Palo Alto Unit42 — OilRig campaign analysis: https://unit42.paloaltonetworks.com/tag/oilrig/
  5. ESET Research — OilRig tooling analysis: https://www.welivesecurity.com
  6. Trend Micro — Earth Simnavaz (2024): https://www.trendmicro.com/en_us/research/24/j/earth-simnavaz.html
  7. Check Point Research — VEATY & SPEARAL (2024): https://research.checkpoint.com
  8. Malwarebytes — SAITAMA backdoor analysis (2022): https://www.malwarebytes.com/blog/threat-intelligence
  9. Lab Dookhtegan leak — Telegram (2019) — archived via OSINT sources
  10. AlienVault OTX — APT34/OilRig IOCs: https://otx.alienvault.com/browse/global/pulses?q=APT34
  11. SigmaHQ — OilRig detection rules: https://github.com/SigmaHQ/sigma