BellaCiao Malware Overview
BellaCiao is a sophisticated .NET-based dropper malware developed and deployed by CharmingKitten (IRGC-IO Counterintelligence Division, Department 40). The malware was first publicly analyzed by BitDefender and subsequently exposed through the release of its complete source code in Episode 3.This analysis is based on the actual source code leaked from CharmingKitten’s internal network, providing unprecedented insight into Iranian APT malware development.
Overview
BellaCiao serves as a dropper that enables persistent access to compromised systems, primarily targeting Microsoft Exchange servers and IIS web servers. The malware comes in two distinct variants, each with different deployment mechanisms and capabilities.Variant 1
C# webshell dropper with file upload, download, and command execution
Variant 2
PowerShell script with Plink reverse proxy and customized webserver
Malware Characteristics
Platform and Language
- Primary Language: .NET C# (Variant 1), PowerShell (Variant 2)
- Target Systems: Microsoft Windows Server (IIS, Exchange)
- Persistence Mechanism: Windows Service, scheduled tasks
- Network Communication: DNS-based C2, HTTP webserver
Attribution
BellaCiao has been definitively attributed to CharmingKitten through:- Complete source code recovery from internal networks
- Infrastructure overlap with known CharmingKitten operations
- Personnel connections documented in Episode 4
- Correlation with publicly analyzed samples by BitDefender
Variant Comparison
| Feature | Variant 1 (C# Dropper) | Variant 2 (PowerShell) |
|---|---|---|
| Deployment | Windows Service | PowerShell script |
| C2 Method | DNS beaconing | Plink reverse proxy |
| Webshell | ASP.NET (.aspx) | PowerShell webserver |
| Target Paths | IIS wwwroot, Exchange OWA paths | Local HTTP listener |
| Persistence | Service installation | Scheduled task |
| File Operations | Upload, download, execute | Full webserver capabilities |
| Domains | eposta.maill-support.com eposta.mailupdate.info | twittsupport.com msn-center.uk |
Technical Architecture
Variant 1 Architecture
Variant 2 Architecture
Known Attacks
BellaCiao has been used in confirmed attacks against:Turkish Foreign Ministry
Turkish Foreign Ministry
Attack Date: 2022-2024Details:
- BellaCiao Variant 1 deployed to Exchange server
- Webshell placed at Exchange OWA path
- DNS beaconing to eposta.maill-support.com
- Full network compromise with lateral movement
- Credentials: Admin1@MFA, pfsenselondra@MFA
Dubai Police
Dubai Police
Attack Date: Documented in Episode 4Details:
- BellaCiao configuration found in leaked materials
- Attack methodology and tools documented
- See Episode 4 Additional Materials
Multiple Middle East Targets
Multiple Middle East Targets
Geographic Scope: Turkey, UAE, Saudi Arabia, Kuwait, JordanDetails:
- Part of broader ProxyShell exploitation campaign
- 200+ targets across region
- BellaCiao used for post-exploitation persistence
- See Operations Targets
External Analysis
BitDefender published a comprehensive technical analysis of BellaCiao malware:BitDefender Analysis
“Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware” - Read the full BitDefender report
- Attribution to Iranian threat actors
- Technical characteristics match leaked source code
- Deployment patterns consistent with CharmingKitten operations
- Infrastructure overlap with other IRGC-IO tools
Command and Control Infrastructure
Primary Domains (Variant 1)
eposta.maill-support.com- Primary C2 domaineposta.mailupdate.info- Backup C2 domain
Secondary Domains (Variant 2)
twittsupport.com- Primary SSH tunnel endpointmsn-center.uk- Backup SSH tunnel endpoint
Indicators of Compromise (IoCs)
File Paths
Service Names
MicrosoftAgentServices- Windows Service name for Variant 1
DNS Patterns
Network Indicators
- Local webserver on
127.0.0.1:49450(Variant 2) - SSH tunnel credentials:
-l Israel -pw Israel@123!
Detection Recommendations
Monitor DNS queries
Alert on DNS queries to
*.eposta.maill-support.com, *.eposta.mailupdate.info, twittsupport.com, and msn-center.ukScan web paths
Search for unexpected ASPX files in IIS wwwroot and Exchange OWA authentication paths
Related Pages
Variant 1 Analysis
Deep dive into C# webshell dropper
Variant 2 Analysis
PowerShell reverse proxy analysis
Technical Analysis
Detailed technical analysis and malware behavior
Episode 3
Episode 3 source code release