Documentation Index
Fetch the complete documentation index at: https://mintlify.com/KittenBusters/CharmingKitten/llms.txt
Use this file to discover all available pages before exploring further.
Overview
The domain infrastructure used by Charming Kitten has been extracted from the BellaCiao malware source code (Episode 3) and infrastructure documentation (Episode 4). These domains serve as command-and-control (C2) infrastructure and data exfiltration channels.BellaCiao C2 Domains
Primary C2 Domains (Variant 1)
FromService1.cs in BellaCiao source code:
Domain Details
eposta.maill-support.com
Primary C2 Domain
- Used by BellaCiao Variant 1
- DNS-based command channel
- Subdomain pattern:
[random]EXH.eposta.maill-support.com
eposta.mailupdate.info
Backup C2 Domain
- Fallback if primary domain fails
- Same subdomain pattern
- Activated after 60-second delay
BellaCiao DNS C2 Protocol
The malware uses a sophisticated DNS-based C2 mechanism:Command IP Encoding
The C2 server responds with specially crafted IP addresses that encode commands:| IP Pattern | Command | Action |
|---|---|---|
*.*.168.58 | Deploy webshell | Write malicious .aspx file |
212.175.168.59 | Cleanup | Remove deployed webshells |
212.175.*.* | Predefined target | Use hardcoded file paths |
*.175.168.* | Exchange path 1 | Deploy to /owa/auth/Current/themes/resources/ |
*.176.168.* | Exchange path 2 | Deploy to /owa/auth/Current/themes/ |
*.177.168.* | Exchange path 3 | Deploy to /owa/auth/Current/ |
Secondary C2 Domains (Variant 2)
Fromiis.ps1 in BellaCiao Variant 2:
twittsupport.com
Primary Tunnel Domain
- Used for reverse SSH tunneling
- Port: 443
- Credential: Israel:Israel@123!
msn-center.uk
Backup Tunnel Domain
- Fallback tunnel server
- Same port and credentials
- 10-second delay before fallback
Tunnel Configuration
The PowerShell implant establishes reverse tunnels:Compromised Domain Infrastructure
Turkish Foreign Ministry
Fromeposta.txt - actual compromised URL:
Webshell Deployment Paths
Webshell Deployment Paths
The malware deployed webshells to multiple paths on compromised Exchange servers:
Campaign-Specific Domains
Moses Staff Campaign
From Episode 4 infrastructure documentation:| Domain | TLD | Registrar | Registration Date | Status |
|---|---|---|---|---|
| moses-staff.io | .io | namecheap.com | 1/9/2024 | Ticket #2073 |
| moses-staff.to | .to | namecheap.com | 1/9/2024 | Credential exposed |
| moses-staff.se | .se | prq.se | 1/9/2024 | Ticket #2072 |
Moses Staff Credentials
Israel Talent Campaign
| Domain | TLD | Registrar | Registration Date | Purpose |
|---|---|---|---|---|
| israel-talent.com | .com | theonionhost.com | 25/2/2024 | Primary phishing domain |
| israel-talent.xyz | .xyz | namesilo.com | 20/1/2025 | Alternate domain |
Israel Talent Infrastructure
Israel Talent Infrastructure
Abrahams Ax Campaign
| Component | Details |
|---|---|
| Domain Provider | prq.se (kundcenter.prq.se) |
| Registration | 10/10/2024 |
| Cost | $100 (1 year) |
| Account | GDavies007@proton.me:J7Z4pw-G |
| Credentials | GDavies007@proton.me:6EF94ELUgAKdPqH |
| TOR Hosting | portal.imprezahost.com |
| TOR Account | nansi.morad@protonmail.com:vAFc,7mNvi+-G |
| TOR Registration | 5/11/2023 - $90 |
Additional Campaign Domains
BBM Movement
bbmovements.com
- Registrar: namesilo.com
- Registration: 8/11/2024
- Renewal: 13/11/2024
- Ticket: #bbm
Termite
termite.nu
- Registrar: prq.se
- Account: johnshopkinster@protonmail.com:Ubefrp
- Registration: 25/11/2023
- Cost: $45
- Alt Creds: johnshopkinster@protonmail.com:zNUyBQVwb6jqT5M
Dreamy Jobs
dreamy-jobs.com
- Registrar: namesilo.com
- Registration: 1/7/2024
- Cost: $15
- Account: ronald.iverson@protonmail.com:7?n9”b/Aj~)6A
- Ticket: #2065
Wazayif Halima
wazayif-halima.org
- Registrar: namesilo.com
- Registration: 30/8/2024
- Account: ronald.iverson@protonmail.com:7?n9”b/Aj~)6A
- Ticket: #2069
SecNetDC Infrastructure
Tecret Infrastructure
Cavinet Infrastructure
Domain Naming Patterns
Observed Patterns
Charming Kitten uses specific patterns in their domain selection:-
Typosquatting Mail Services
eposta.maill-support.com(double-l)eposta.mailupdate.infomsn-center.uk
-
Regional/Geopolitical Themes
israel-talent.com/xyzmoses-staff.*(multiple TLDs)wazayif-halima.org(Arabic: jobs)
-
Technical/Support Themes
twittsupport.comsecnetdc.comtecret.com
-
Generic Business Themes
dreamy-jobs.comcavinet.org
Subdomain Structure
BellaCiao generates randomized subdomains:C2 Communication Flow
Random Subdomain Generation
Generate 2-char uppercase + 3-char lowercase random string (e.g., “ABxyz”)
Command Parsing
Parse returned IP address to determine command:
- Last octet = 58: Deploy webshell
- IP = 212.175.168.59: Remove webshells
Domain Infrastructure Timeline
Registrar Distribution
| Registrar | Domains | Operations |
|---|---|---|
| namecheap.com | 3+ | cavinet.org, moses-staff.io, moses-staff.to |
| namesilo.com | 4+ | bbmovements.com, dreamy-jobs.com, wazayif-halima.org, israel-talent.xyz |
| prq.se | 3+ | moses-staff.se, termite.nu, Abrahams Ax |
| modernizmir.net | 2+ | secnetdc.com, tecret.com |
| theonionhost.com | 5+ | moses-staff, israel-talent.com, dreamy-jobs, wazayif-halima, tecret |
| impreza.host | 2+ | moses-staff, Abrahams Ax |
Detection and Mitigation
YARA Rule for Domain Detection
Related Infrastructure
See also:- Server Infrastructure - Hosting providers, tunnel servers, and IP addresses
- Exposed Credentials - Account credentials and internal access
References
- BellaCiao Variant 1 source:
Episode 3/BellaCiao/Variant1/Eposta/Backdoor/ShellDropper/MicrosoftAgentServices/Service1.cs:23-24 - BellaCiao Variant 2 source:
Episode 3/BellaCiao/Variant2/iis.ps1:7-8 - Infrastructure documentation:
Episode 4/0-SERVICE-Service.csv - Compromise evidence:
Episode 3/BellaCiao/Variant1/Eposta/Backdoor/ShellDropper/eposta.txt - BitDefender BellaCiao Analysis: https://www.bitdefender.com/en-us/blog/businessinsights/unpacking-bellaciao-a-closer-look-at-irans-latest-malware