CharmingKitten
APT Exposure
Complete documentation exposing IRGC-IO Counterintelligence Division (Unit 1500) Department 40 malicious activities, malware source code, and operational infrastructure.
Understanding the threat
Navigate through episodic releases, technical malware analysis, and intelligence reports documenting CharmingKitten’s operations.
Review the background
Explore episode releases
Analyze the malware
Review intelligence reports
Explore by topic
Navigate directly to specific areas of interest
Episode Releases
BellaCiao Malware
Webshells & Tools
Infrastructure
Attack Reports
Personnel & Attribution
Key exposed assets
Critical intelligence and technical artifacts
BellaCiao Source Code
Complete C# and PowerShell source code for both variants, including dropper mechanisms and webshell deployment logic
Python C2 Framework
Command-and-control interface scripts (connect.py, rce5.py) with custom encoding and webshell communication protocols
Infrastructure Spreadsheets
Complete server inventory with procurement identities, login credentials, attack servers, and file storage infrastructure
Personnel Identification
Named individuals including Abbas Rahrovi (leader), national ID numbers, photos, and role documentation within Department 40
Ready to explore the intelligence?
Start with the comprehensive introduction or jump directly into technical malware analysis.