Overview
The domain infrastructure used by Charming Kitten has been extracted from the BellaCiao malware source code (Episode 3) and infrastructure documentation (Episode 4). These domains serve as command-and-control (C2) infrastructure and data exfiltration channels.BellaCiao C2 Domains
Primary C2 Domains (Variant 1)
FromService1.cs in BellaCiao source code:
Domain Details
eposta.maill-support.com
Primary C2 Domain
- Used by BellaCiao Variant 1
- DNS-based command channel
- Subdomain pattern:
[random]EXH.eposta.maill-support.com
eposta.mailupdate.info
Backup C2 Domain
- Fallback if primary domain fails
- Same subdomain pattern
- Activated after 60-second delay
BellaCiao DNS C2 Protocol
The malware uses a sophisticated DNS-based C2 mechanism:Command IP Encoding
The C2 server responds with specially crafted IP addresses that encode commands:| IP Pattern | Command | Action |
|---|---|---|
*.*.168.58 | Deploy webshell | Write malicious .aspx file |
212.175.168.59 | Cleanup | Remove deployed webshells |
212.175.*.* | Predefined target | Use hardcoded file paths |
*.175.168.* | Exchange path 1 | Deploy to /owa/auth/Current/themes/resources/ |
*.176.168.* | Exchange path 2 | Deploy to /owa/auth/Current/themes/ |
*.177.168.* | Exchange path 3 | Deploy to /owa/auth/Current/ |
Secondary C2 Domains (Variant 2)
Fromiis.ps1 in BellaCiao Variant 2:
twittsupport.com
Primary Tunnel Domain
- Used for reverse SSH tunneling
- Port: 443
- Credential: Israel:Israel@123!
msn-center.uk
Backup Tunnel Domain
- Fallback tunnel server
- Same port and credentials
- 10-second delay before fallback
Tunnel Configuration
The PowerShell implant establishes reverse tunnels:Compromised Domain Infrastructure
Turkish Foreign Ministry
Fromeposta.txt - actual compromised URL:
Webshell Deployment Paths
Webshell Deployment Paths
The malware deployed webshells to multiple paths on compromised Exchange servers:
Campaign-Specific Domains
Moses Staff Campaign
From Episode 4 infrastructure documentation:| Domain | TLD | Registrar | Registration Date | Status |
|---|---|---|---|---|
| moses-staff.io | .io | namecheap.com | 1/9/2024 | Ticket #2073 |
| moses-staff.to | .to | namecheap.com | 1/9/2024 | Credential exposed |
| moses-staff.se | .se | prq.se | 1/9/2024 | Ticket #2072 |
Moses Staff Credentials
Israel Talent Campaign
| Domain | TLD | Registrar | Registration Date | Purpose |
|---|---|---|---|---|
| israel-talent.com | .com | theonionhost.com | 25/2/2024 | Primary phishing domain |
| israel-talent.xyz | .xyz | namesilo.com | 20/1/2025 | Alternate domain |
Israel Talent Infrastructure
Israel Talent Infrastructure
Abrahams Ax Campaign
| Component | Details |
|---|---|
| Domain Provider | prq.se (kundcenter.prq.se) |
| Registration | 10/10/2024 |
| Cost | $100 (1 year) |
| Account | [email protected]:J7Z4pw-G |
| Credentials | [email protected]:6EF94ELUgAKdPqH |
| TOR Hosting | portal.imprezahost.com |
| TOR Account | [email protected]:vAFc,7mNvi+-G |
| TOR Registration | 5/11/2023 - $90 |
Additional Campaign Domains
BBM Movement
bbmovements.com
- Registrar: namesilo.com
- Registration: 8/11/2024
- Renewal: 13/11/2024
- Ticket: #bbm
Termite
termite.nu
- Registrar: prq.se
- Account: [email protected]:Ubefrp
- Registration: 25/11/2023
- Cost: $45
- Alt Creds: [email protected]:zNUyBQVwb6jqT5M
Dreamy Jobs
dreamy-jobs.com
- Registrar: namesilo.com
- Registration: 1/7/2024
- Cost: $15
- Account: [email protected]:7?n9”b/Aj~)6A
- Ticket: #2065
Wazayif Halima
wazayif-halima.org
- Registrar: namesilo.com
- Registration: 30/8/2024
- Account: [email protected]:7?n9”b/Aj~)6A
- Ticket: #2069
SecNetDC Infrastructure
Tecret Infrastructure
Cavinet Infrastructure
Domain Naming Patterns
Observed Patterns
Charming Kitten uses specific patterns in their domain selection:-
Typosquatting Mail Services
eposta.maill-support.com(double-l)eposta.mailupdate.infomsn-center.uk
-
Regional/Geopolitical Themes
israel-talent.com/xyzmoses-staff.*(multiple TLDs)wazayif-halima.org(Arabic: jobs)
-
Technical/Support Themes
twittsupport.comsecnetdc.comtecret.com
-
Generic Business Themes
dreamy-jobs.comcavinet.org
Subdomain Structure
BellaCiao generates randomized subdomains:C2 Communication Flow
Random Subdomain Generation
Generate 2-char uppercase + 3-char lowercase random string (e.g., “ABxyz”)
Command Parsing
Parse returned IP address to determine command:
- Last octet = 58: Deploy webshell
- IP = 212.175.168.59: Remove webshells
Domain Infrastructure Timeline
Registrar Distribution
| Registrar | Domains | Operations |
|---|---|---|
| namecheap.com | 3+ | cavinet.org, moses-staff.io, moses-staff.to |
| namesilo.com | 4+ | bbmovements.com, dreamy-jobs.com, wazayif-halima.org, israel-talent.xyz |
| prq.se | 3+ | moses-staff.se, termite.nu, Abrahams Ax |
| modernizmir.net | 2+ | secnetdc.com, tecret.com |
| theonionhost.com | 5+ | moses-staff, israel-talent.com, dreamy-jobs, wazayif-halima, tecret |
| impreza.host | 2+ | moses-staff, Abrahams Ax |
Detection and Mitigation
YARA Rule for Domain Detection
Related Infrastructure
See also:- Server Infrastructure - Hosting providers, tunnel servers, and IP addresses
- Exposed Credentials - Account credentials and internal access
References
- BellaCiao Variant 1 source:
Episode 3/BellaCiao/Variant1/Eposta/Backdoor/ShellDropper/MicrosoftAgentServices/Service1.cs:23-24 - BellaCiao Variant 2 source:
Episode 3/BellaCiao/Variant2/iis.ps1:7-8 - Infrastructure documentation:
Episode 4/0-SERVICE-Service.csv - Compromise evidence:
Episode 3/BellaCiao/Variant1/Eposta/Backdoor/ShellDropper/eposta.txt - BitDefender BellaCiao Analysis: https://www.bitdefender.com/en-us/blog/businessinsights/unpacking-bellaciao-a-closer-look-at-irans-latest-malware