Threats Feed|APT34|Last Updated 28/01/2026|AuthorCertfa Radar|Publish Date24/06/2022

APT34’s Saitama Agent: Phishing and DNS Tunneling in Jordan

  • Actor Motivations: Espionage,Exfiltration
  • Attack Vectors: Backdoor,Dropper,Malicious Macro,Malware,Spear Phishing
  • Attack Complexity: Medium
  • Threat Risk: Unknown

Threat Overview

APT34's Saitama Agent employs a spear phishing email with a malicious Excel attachment to deliver malware using unique DNS tunneling and stateful programming techniques. The Excel document contains a VBA macro that hides its activities and communicates with the C2 server using DNS requests. The macro checks for mouse connections, drops multiple files, and uses a scheduled task for persistence. The campaign appears to be targeting Jordan, leveraging a Jordanian government ministry's logo to deceive victims.

Detected Targets

TypeDescriptionConfidence
RegionJordan
High

Extracted IOCs

  • asiaworldremit[.]com
  • joexpediagroup[.]com
  • uber-asia[.]com
  • 79c7219ba38c5a1971a32b50e14d4a13
  • afdc68f0b6ce87ebef0fec5565c80fd3
  • c4f81486d10818e0bd4b9701dcafc8a2
  • f9a1b01e2d5c4cb2d632a74fcb7ec2dd
  • 15a1b1ebf04870aad7ea4bd7d0264f17057e9002
  • 2641a3cc98aa84979be68b675e26e5f94f059b57
  • 5a9b17a0510301725dceafff026eca872fb05579
  • b39b3a778f0c257e58c0e7f851d10c707fbe2666
  • 09c19455f249514020a4075667b087b16eaad440938f2d139399d21117879e60
  • 26884f872f4fae13da21fa2a24c24e963ee1eb66da47e270246d6d9dc7204c2b
  • 7ebbeb2a25da1b09a98e1a373c78486ed2c5a7f2a16eec63e576c99efe0c7a49
  • e0872958b8d3824089e5e1cfab03d9d98d22b9bcb294463818d721380075a52d
download

Tip: 15 related IOCs (0 IP, 3 domain, 0 URL, 0 email, 12 file hash) to this threat have been found.

Overlaps

Earth SimnavazEarth Simnavaz Targets UAE and Persian Gulf Energy Sector with Advanced Cyber Espionage

Source: Trend Micro - October 2024

Detection (one case): 7ebbeb2a25da1b09a98e1a373c78486ed2c5a7f2a16eec63e576c99efe0c7a49

APT34Understanding Saitama: The Latest Weapon in APT34's Cyber Arsenal

Source: SANS - June 2022

Detection (four cases): e0872958b8d3824089e5e1cfab03d9d98d22b9bcb294463818d721380075a52d, asiaworldremit[.]com, joexpediagroup[.]com, uber-asia[.]com

APT34APT34 Uses Saitama Backdoor to Attack Jordanian Government through DNS Tunnelling

Source: Malwarebytes - May 2022

Detection (five cases): 26884f872f4fae13da21fa2a24c24e963ee1eb66da47e270246d6d9dc7204c2b, e0872958b8d3824089e5e1cfab03d9d98d22b9bcb294463818d721380075a52d, asiaworldremit[.]com, joexpediagroup[.]com, uber-asia[.]com

APT34Unveiling APT34’s Advanced Attack Tactics: From Excel Macros to DNS Tunneling

Source: Fortinet - May 2022

Detection (five cases): 7ebbeb2a25da1b09a98e1a373c78486ed2c5a7f2a16eec63e576c99efe0c7a49, e0872958b8d3824089e5e1cfab03d9d98d22b9bcb294463818d721380075a52d, asiaworldremit[.]com, joexpediagroup[.]com, uber-asia[.]com

APT34APT34 Targets Jordan's Government with Saitama Backdoor: A New Wave of Cyber Espionage

Source: Malwarebytes - May 2022

Detection (five cases): 26884f872f4fae13da21fa2a24c24e963ee1eb66da47e270246d6d9dc7204c2b, e0872958b8d3824089e5e1cfab03d9d98d22b9bcb294463818d721380075a52d, asiaworldremit[.]com, joexpediagroup[.]com, uber-asia[.]com

Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.

FAQs

Understanding the APT34 Saitama Malware Attack

A new malware called "Saitama," linked to the APT34 group, was delivered through a phishing email containing a malicious Excel attachment. When the file is opened and macros are enabled, the malware installs a stealthy backdoor.

The attack is attributed to APT34, a known Iranian cyber espionage group that targets government, energy, and critical infrastructure organizations in the Middle East and beyond.

The malware aims to silently take control of infected systems, gather internal information, execute commands, and exfiltrate data without detection using DNS tunneling techniques.

The attack appeared to impersonate a Jordanian government ministry, suggesting regional government organizations or contractors may have been targeted.

The malware was embedded in an Excel document. When the user enabled macros, it dropped a malicious program that communicates with external servers using hidden DNS queries and responds based on pre-defined program states.

Government and infrastructure organizations often store sensitive information and control critical systems, making them high-value targets for espionage.

Organizations should disable macros by default, monitor DNS traffic for suspicious patterns, and implement strict access controls and endpoint detection solutions.

This appears to be a targeted attack with specific goals, likely focused on espionage. However, the underlying techniques could be reused in broader campaigns.