Overview
Episode 4 exposed extensive credential information maintained in plaintext Excel spreadsheets by:- MOHAMMAD NAJAFLOO (National ID:
4270878835) - Original credential database maintainer - MOHAMMADERFAN HAMIDIAREF (National ID:
0023199709) - Current maintainer
- Internal network access to compromised organizations
- Communication platforms (ISABELLE, 3CX, SIGNAL)
- File extraction and storage systems
- Infrastructure management accounts
Internal Network Credentials
Turkish Foreign Ministry (MFA) Compromise
Fromeposta.txt found with BellaCiao source code:
Domain Admin Credentials
Domain Admin Credentials
pfSense Admin Account
pfSense Admin Account
Tunnel Access Credentials
Tunnel Access Credentials
Compromised Internal Network Topology
Documented internal IPs with access credentials:| IP Address | System | Access Method | Credentials |
|---|---|---|---|
| 10.20.105.11 | Primary staging server | SMB/WMIC | Admin1@MFA |
| 10.20.105.21 | Secondary target | SMB | Admin1@MFA |
| 10.20.105.25 | Workstation | WMIC | pfsenselondra@MFA |
| 10.20.101.17 | Domain controller | SMB/WMIC | Admin1@MFA |
| 10.20.101.2 | TMG Server | WMIC | Admin1@MFA |
| 10.20.101.43 | Log collection | SMB share | Admin1@MFA |
| 10.20.106.60 | Compromised host | WMIC | Admin1@MFA |
Infrastructure Management Credentials
Hosting Provider Accounts
TheOnionHost
Multiple OperationsMoses Staff:
- [email protected]
- jgfk&^%hngGJ54*/s+*&%$hggfaD
- Ticket: #2023
- [email protected]
- {1h)p0f_R(Ln (initial)
- Kh74QjGDq35NtvB (alternate)
- Ticket: #2029
- [email protected]
- 15aB@gd52$kD#
- Ticket: #2066
- [email protected]
- n!hnuec?‘9*Pb2D
- [email protected]
- RN8OiQ6Y(%H0
- Ticket: #2067
Impreza Host
Tor Hosting ServicesMoses Staff:
- Portal: portal.imprezahost.com
- [email protected]
- rbC5vMjZh98AGTe
- Access: http://95.183.51.49:7800/88e6c70
- Web Creds: hhtfhtmz:EyfjC5t5bH@3eqw
- Ticket: #ms
- [email protected]
- vAFc,7mNvi+-G
- Date: 5/11/2023 - $90
- [email protected]
- dm4ac2FgrL#-G
- Date: 25/8/2024 - $135
- Auth: Ap4VPAqum5qNL
PQ Hosting
BBM MovementVPS:
- bill.pq.hosting
- [email protected]
- 5U5v6L0s
- Date: 20/02/2024 - €21 (3 months)
- Ticket: #2070
- bill.pq.hosting
- [email protected]
- 5U5v6L0s
- Date: 22/02/2024 - €6
- Ticket: #2020
ModernizMir
Domain & Hosting ResellerSecNetDC:
- [email protected]
- MXQ8GLX5qg3yEUV
- Host: 23/8/2023 - $10
- Domain: 10/1/2025 - $70
- API: 3A5MBwQsQvJdernıZ3FtFMPnoБs6HfMdWK
- Ticket: #2063
- [email protected]
- 2tJuGXqHFbAJNjS
- Renewal: 6/11/2024
Domain Registrar Accounts
- NameCheap
- NameSilo
- PRQ.se
- Other
Server Root Access
Communication Platform Credentials
Internal Communication Systems
Charming Kitten used multiple platforms for internal coordination:ISABELLE
Internal Chat Platform
- IRGC-IO standard communication tool
- Used for operational coordination
- Referenced in Episode 1 & 2 leaks
- Internal network only
3CX
VoIP Communication
- Voice and messaging platform
- Operational discussions
- Employee coordination
- Internal deployment
SIGNAL
Encrypted Messaging
- External communications
- Operational security
- Mobile coordination
- Mentioned in documentation
ProtonMail Accounts
Extensive use of ProtonMail for operational security:| Email Account | Password | Operations | Ticket |
|---|---|---|---|
| [email protected] | CMEPZ9WMb8difTw | Cavinet infrastructure | #2016 |
| [email protected] | 5U5v6L0s | BBM Movement hosting | #2070 |
| [email protected] | MXQ8GLX5qg3yEUV | SecNetDC services | #2063 |
| [email protected] | RN8OiQ6Y(%H0 (host) 2tJuGXqHFbAJNjS (domain) | Tecret infrastructure | #2067 |
| [email protected] | JHg&%asjh98*&^$dI&*^fd | Moses Staff .io | #2073 |
| [email protected] | ghfycf6787$DSHJ&^%#q | Moses Staff .to | - |
| [email protected] | jgfk&^%hngGJ54*/s+*&%$hggfaD (TOR) rbC5vMjZh98AGTe (impreza) | Moses Staff hosting | #2023/#ms |
| [email protected] | GF675%^#@6-*GH678f-G<br/>HG^&%hg4156-*fsv | Moses Staff CloudDNS | #2056 |
| recivestaff | CxZZspFuUfZF3m3-G | Moses Staff mailbox | #2041 |
| [email protected] | {1h)p0f_R(Ln Kh74QjGDq35NtvB | Israel Talent | #2029 |
| [email protected] | Ubefrp zNUyBQVwb6jqT5M | Termite.nu | - |
| [email protected] | 15aB@gd52$kD# | Dreamy Jobs host | #2066 |
| [email protected] | 7?n9”b/Aj~)6A | Dreamy Jobs & Wazayif domains | #2065/#2069 |
| [email protected] | n!hnuec?‘9*Pb2D | Wazayif Halima host | - |
| [email protected] | J7Z4pw-G (domain) 6EF94ELUgAKdPqH (creds) dm4ac2FgrL#-G (host) | Abrahams Ax | - |
| [email protected] | vAFc,7mNvi+-G | Abrahams Ax TOR | - |
| [email protected] | JHGF&(^T&OYGI KUIYR(*&UG^&*Y | SSL certificates | - |
Alternate Email Services
File Extraction Systems
Data Exfiltration Methods
From Episode 4 documentation and BellaCiao analysis:- Web-Based Extraction
- WMIC Remote Execution
- Storage Servers
BellaCiao Webshell InterfaceThe deployed webshells provided file extraction capabilities:Webshell Deployment Paths:
Data Staging Locations
Compromised systems were used as staging points:SMS and Verification Services
Payment and Financial Credentials
Bitcoin Payment Tracking
Episode 4 includes
0-SERVICE-payment BTC.csv documenting Bitcoin transactions for infrastructure purchases.- Anonymous hosting services
- Domain registrations through privacy-focused registrars
- VPN and tunnel services
- SMS verification services
Credential Security Analysis
Password Patterns
Observed Password Characteristics
Observed Password Characteristics
- High Complexity Strings: Random-looking combinations like
jgfk&^%hngGJ54*/s+*&%$hggfaD - Memorable Patterns:
KazimAtes1977+-*/!!KazimAtes1977+-*/!!(repeated) - Simple Passwords:
1234qqqQQQ,ruby@123!,Israel@123! - Mixed Complexity: Some accounts use strong passwords, others use weak
- Special Characters: Heavy use of
!@#$%^&*() - No MFA: No evidence of multi-factor authentication
Operational Security Failures
- Plaintext Storage: All credentials stored in unencrypted Excel spreadsheets
- Centralized Documentation: Single point of failure for entire infrastructure
- Credential Reuse: Same ProtonMail accounts used across multiple services
- Predictable Patterns: Observable patterns in email account creation
- No Rotation: No evidence of credential rotation procedures
- Internal Network Compromise: Domain admin credentials documented in plaintext
- Shared Access: Multiple operators with access to credential database
- No Compartmentalization: Single spreadsheet contains all operational credentials
Ticket System
The group used a ticketing system for tracking infrastructure:| Ticket Format | Operations | Examples |
|---|---|---|
#20XX | Numbered tickets | #2016, #2023, #2041, #2073 |
#[operation] | Operation-specific | #bbm, #ms |
Detection Recommendations
Compromise Indicators
If your organization was targeted, check for:Account Activity
Search Active Directory for accounts matching:
Admin1@MFA, pfsenselondra@MFA, or similar patternsFile Presence
Check for files at documented staging locations:
c:\windows\temp\vmware-tools.exec:\programdata\microsoft\diagnostic\*.exec:\inetpub\wwwroot\aspnet_client\*.aspx
Network Connections
Review firewall logs for connections to:
- 103.57.251.153:443 (tunnel server)
- 95.169.196.* (hosting infrastructure)
- 95.183.51.* / 95.183.53.* (operation servers)
- 212.175.168.58 (C2 server)
Related Pages
- Server Infrastructure - Hosting and server details
- Domain Infrastructure - C2 domains and DNS infrastructure
- BellaCiao Malware - Technical analysis of the malware
References
- Episode 4 leak:
0-SERVICE-Service.csv- Infrastructure credential database - Episode 4 leak:
1-NET-Sheet1.csv- Network topology - Episode 4 leak:
0-SERVICE-payment BTC.csv- Payment records - Episode 3 leak:
eposta.txt- Turkish MFA compromise credentials - Episode 3 leak: BellaCiao source code - Embedded credentials and infrastructure
- Episode 1 & 2: Internal communication platform references (ISABELLE, 3CX, SIGNAL)