DFIR and CTI Analysis Date: 2025-10-29
This report provides a comprehensive analysis of the Tactics, Techniques, and Procedures (TTPs), operational tradecraft, and targeting patterns of the threat actor group known as "Charming Kitten." The analysis is based on a leaked dataset of the group's internal documents, logs, and operational reports. The findings indicate a sophisticated and well-organized actor with a clear focus on espionage and disruptive attacks.
A groundbreaking finding from the Episode 4 leak is the direct link between Charming Kitten and the previously distinct threat groups known as "Moses-Staff" and "Qassam". Analysis of the group's internal infrastructure and payment records reveals that these are not separate entities, but rather pseudo-names or campaigns operated by Charming Kitten. This attribution, which has not been publicly documented before, is a critical development in understanding the group's structure and methods.
Furthermore, the latest data reveals a significant operational scope, including a detailed ledger of their infrastructure, use of cryptocurrency, internal phishing guides, and an expanded targeting focus to include the medical engineering sector. This latest leak represents a major operational security failure, providing unprecedented insight into the group's inner workings.
The analyzed data confirms that Charming Kitten is a capable threat actor with a structured operational methodology. The group is comprised of skilled operators who are proficient in a wide range of TTPs, from initial reconnaissance to post-exploitation and data exfiltration. The use of custom tools, detailed reporting, and a clear command structure all point to a state-sponsored or state-affiliated group.
A key finding from the Episode 4 leak is the revelation that Charming Kitten operates under multiple fronts, including the previously tracked groups "Moses-Staff" and "Qassam." The file 0-SERVICE-Service.csv, which acts as an internal ledger for the group's domains and servers, contains explicit references to infrastructure for both "moses-staff" and "musalas-alqassam." Financial records in 0-SERVICE-payment BTC.csv also show Bitcoin payments for services directly related to these campaigns (e.g., "SSl moses," "gassam.su"). This provides direct evidence that these are not separate threat actors but rather integrated campaigns or sub-groups managed by Charming Kitten, likely for specific psychological or operational objectives.
A high-level report from a group calling itself the "Ofogh Media Institute" outlines several strategic objectives, primarily focused on Israel and associated entities. These objectives include:
- Critical Infrastructure Attacks: Exfiltrating data from airports and hotel reservation systems, and gaining access to industrial infrastructure and SCADA systems for potential offensive operations.
- Widespread Ransomware Attacks: Compromising over 300 websites and companies to deploy ransomware.
- Intelligence Gathering & Surveillance: Infiltrating CCTV cameras in sensitive security and public locations.
- Psychological and Influence Operations: Conducting psychological warfare (e.g., through the "Moses Staff" hacker group), inciting social unrest through dedicated campaigns, and doxing military and security personnel to enable further targeting.
This section synthesizes the TTPs observed across all four episodes of the data leak.
- Vulnerability Scanning: The group uses a variety of both public and private tools to scan for vulnerabilities, including Shodan, Censys, ZoomEye, Fofa, Hunter.how, and Nuclei.
- Target Profiling: They actively gather intelligence on their targets, including identifying key personnel, mapping network infrastructure, and enumerating web application technologies.
- Exploitation of Public-Facing Applications: The group has demonstrated success in exploiting a wide range of vulnerabilities, including:
- Microsoft Exchange: ProxyShell (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207)
- Ivanti Connect Secure: CVE-2024-21887, CVE-2024-21893, CVE-2024-22024
- ConnectWise ScreenConnect: CVE-2024-1709
- Log4j: CVE-2021-44228 (Log4Shell)
- WordPress, GitLab, Confluence, Jenkins: Various vulnerabilities.
- SQL Injection: The group uses
sqlmapto automate the discovery and exploitation of SQL injection vulnerabilities. - Phishing: They conduct sophisticated phishing campaigns targeting Gmail accounts, using a custom phishing kit and detailed internal guides for setting up infrastructure.
- Webshells: The group frequently deploys ASP and ASP.NET webshells for initial command execution.
- Command and Scripting Interpreter: They make extensive use of Python, shell scripting, and PowerShell (as seen in
BellaCiaoVariant 2) for automation and post-exploitation. - Custom Implants: The group develops and deploys multiple custom RATs and backdoors written in C#/.NET (
RAT-2Ac2), native code (Sagheb), and PowerShell (BellaCiao).
- Webshells: Webshells are a primary means of maintaining persistent access to web servers.
- Create or Modify System Process: Windows Service: The
BellaCiaomalware (Variant 2) persists by creating a Windows Service to ensure it runs automatically. - Scheduled Task/Job: The
SaghebRAT has a feature to configure "Auto Run" on a weekly or daily basis, indicating persistence through scheduled tasks. - Legitimate Account Usage: The group has been observed using compromised credentials to maintain access.
The group actively seeks to escalate privileges, with a focus on gaining DBA access to databases and Domain Admin rights in Active Directory environments.
- Log Clearing: Operators have been observed clearing logs and command history to cover their tracks.
- Timestamp Manipulation: The group alters file timestamps to obfuscate their activities.
- Custom Encoding and Encryption: The group uses a custom substitution cipher for webshell commands and XOR encryption for the
SaghebRAT's C2 traffic. - C2 Obfuscation: The
SaghebRAT routes its C2 communication through custom relay servers and the TOR network. The group also uses DNS forwarders to hide their primary C2 IP address. - Header-Based Authentication: The
RAT-2Ac2implant uses a pre-shared secret in an HTTP header to authenticate to the C2, preventing unauthorized analysis. - Anti-Debugging: The
SaghebRAT manual explicitly mentions the inclusion of anti-debugging techniques. - FUD Design: The
SaghebRAT is designed to be "Fully Un-Detectable" (FUD) and is written in a native language to avoid framework-based signatures.
- Brute-Force Attacks: The group uses brute-force attacks against WordPress
xmlrpc.phpendpoints. - Credential Dumping: They have been observed exfiltrating user credentials from databases and internal documents.
- Browser and Application Stealing: The
SaghebRAT includes a "Stealer" module specifically designed to exfiltrate credentials and session data from Firefox browsers and the Telegram Desktop application.
- Network and System Enumeration: The custom RATs (
Sagheb,RAT-2Ac2) have built-in functionality to gather detailed system information (OS, CPU, RAM, AV, .NET version, etc.) and enumerate the file system.
- Web Tunnels and SSH Tunneling: The group uses tunnels to pivot within a compromised network, as detailed in their internal phishing guide.
- Remote Services: The operator notes from Episode 3 show the use of
wmicandnet usewith compromised credentials to access other machines on the network.
- Data from Local System: The RATs provide extensive file system browsing, upload, and download capabilities.
- Input Capture: Keylogging: Both the
SaghebandRAT-2Ac2implants include keylogger functionality. - Screen Capture: The
SaghebRAT provides the ability to take screenshots of the victim's desktop. - Data Exfiltration: The primary objective of many operations is to exfiltrate sensitive data, including emails, user databases, and intellectual property.
- Ransomware: The group's stated objectives include deploying ransomware attacks against over 300 websites and companies.
- Disruption of OT/SCADA Systems: A key finding from Episode 2 is the targeting of Industrial Control Systems (ICS) and SCADA systems, indicating a potential intent to cause physical disruption.
- Multi-Layered Infrastructure: The group uses a complex C2 infrastructure involving custom RATs, webshells, TOR, custom relay servers, and DNS forwarders.
- Custom RATs: The group operates at least three distinct RATs (
BellaCiao,Sagheb,RAT-2Ac2) with C2 communication over HTTP/S. - Webshell C2: Simple command and control is achieved via custom Python clients communicating with ASP webshells, often using custom encoding in HTTP headers.
The analyzed data reveals a clear targeting pattern focused on specific countries and sectors. The group's operations appear to be geographically concentrated, with a strong emphasis on the Middle East.
- Israel: A significant number of the identified targets are located in Israel. This includes government entities, technology companies, and financial institutions.
- Jordan: The "Jordan Campaign" report details a large-scale operation targeting a wide range of Jordanian organizations.
- United Arab Emirates (UAE): The
BellaCiaomalware and the webshell client scripts have been observed targeting entities in the UAE, including "dubaipolice" and "flydubai". - Turkish Republic of Northern Cyprus: The
Epostavariant of theBellaCiaomalware was used to target the Ministry of Foreign Affairs of the Turkish Republic of Northern Cyprus. - Other: The logs also show scanning activity against targets in other countries, including Kuwait, Lebanon, Saudi Arabia, and Turkey.
- Government: Government entities in Israel, Jordan, the UAE, and the Turkish Republic of Northern Cyprus are high-priority targets.
- Airlines: The group has been observed targeting the airline industry, specifically "flydubai".
- Technology: The group targets technology companies, including web hosting providers and software development firms.
- Finance: Financial institutions, such as exchanges and banks, are also key targets.
- Telecommunications: The group has been observed targeting telecommunications companies.
- Medical Engineering: The "Episode 4" data reveals a new focus on targeting the medical engineering sector.
Afghanistan
| Target | Country | Inferred Industry | Leaked In |
|---|---|---|---|
| Roshan | Afghanistan | Telecommunications | Episode 1 |
Iran
| Target | Country | Inferred Industry | Leaked In |
|---|---|---|---|
| qudsdaily.com | Iran | Media | Episode 1 |
| theonecorp.ir | Iran | Corporate | Episode 1 |
| ... | ... | ... | ... |
| mom.ir | Iran | Government | Episode 1 |
Israel
| Target | Country | Inferred Industry | Leaked In |
|---|---|---|---|
| bizportal.co.il | Israel | Business/Finance | Episode 1 |
| bezeq.co.il | Israel | Telecommunications | Episode 1 |
| adama.com | Israel | Agriculture | Episode 1 |
| liveperson.com | Israel | Technology | Episode 1 |
| agri.gov.il | Israel | Government | Episode 1 |
| issta.co.il | Israel | Travel/Tourism | Episode 1 |
| exlibrisgroup.com | Israel | Technology | Episode 1 |
| 147.235.149.44 | Israel | Technology | Episode 2 |
| 213.151.38.229 | Israel | Technology | Episode 2 |
| 035565656.com | Israel | Unknown | Episode 2 |
| benni.co.il | Israel | Corporate | Episode 2 |
| compuall.co.il | Israel | IT Services | Episode 2 |
Jordan
| Target | Country | Inferred Industry | Leaked In |
|---|---|---|---|
| Es.JO | Jordan | Web Development | Episode 1 |
| SwissExchange | Jordan | Finance | Episode 1 |
| Al-Nasir Exchange | Jordan | Finance | Episode 1 |
| Shipping Com JO | Jordan | Logistics | Episode 1 |
| Al-Qistas - CyberLaw | Jordan | Legal | Episode 1 |
| Muhandes Imaar | Jordan | Engineering | Episode 1 |
| Jedco.gov.jo | Jordan | Government | Episode 1 |
| jordandesert.org.jo | Jordan | NGO | Episode 3 |
Saudi Arabia
| Target | Country | Inferred Industry | Leaked In |
|---|---|---|---|
| 158.101.230.195 | Saudi Arabia | Conglomerate | Episode 2 |
Turkish Republic of Northern Cyprus
| Target | Country | Inferred Industry | Leaked In |
|---|---|---|---|
| eposta.mfa.gov.ct.tr | Turkish Republic of Northern Cyprus | Government | Episode 3 |
United Arab Emirates
| Target | Country | Inferred Industry | Leaked In |
|---|---|---|---|
| uniforms.flydubai.com | United Arab Emirates | Airlines | Episode 3 |
| dubaipolice (subdomain) | United Arab Emirates | Government | Episode 3 |
Unknown
| Target | Country | Inferred Industry | Leaked In |
|---|---|---|---|
| 193.188.88.156 | Unknown | Unknown | Episode 3 |
| Various IPs | Kuwait, Lebanon, Saudi Arabia, South Korea, Turkey | Unknown | Episode 1 |
The TTPs and targeting observed in this dataset are highly consistent with publicly available reporting on Charming Kitten (also known as APT35, Phosphorus, and Newscaster).
- Focus on Israel: Public reports have long identified Israel as a primary target of Charming Kitten.
- Use of Phishing: The group is well-known for its sophisticated phishing campaigns.
- Exploitation of Web Vulnerabilities: Charming Kitten has a history of exploiting vulnerabilities in web applications, including WordPress and Microsoft Exchange.
- Use of Publicly Available Tools: The group's use of tools like
sqlmapandnmapis consistent with public reporting.
The data provides new insights into the group's internal operations, including their use of custom tools, their structured reporting methodology, and their consideration of ransomware as a potential payload. The direct attribution of the "Moses-Staff" and "Qassam" personas to Charming Kitten is a significant new finding not previously reported.
Analysis of the file metadata, logs, and report filenames has identified several individuals by name. These individuals appear to be a mix of threat actors and potential victims.
| Name | Likely Role/Skillset |
|---|---|
| Shayan | Threat Actor/Operator (Episode 1 & 4): Named in a monthly performance report and in the Episode 4 proposal for "Phishing Infrastructure." |
| Amirhossein | Threat Actor/Operator (Episode 1): Named in a monthly performance report, suggesting a role similar to Shayan's. |
| Kourosh | Threat Actor/Operator (Episode 1 & 4): Named in a monthly performance report and in the Episode 4 proposal for "OSINT" and "Information Gathering." |
| Majid (MJD) | Threat Actor/Operator (Episode 2): Responsible for campaign management, infrastructure setup, and OSINT. |
| Hossein (HSN) | Threat Actor/Operator (Episode 2): Focused on phishing infrastructure and malware development. |
| Ali (على) | Threat Actor/Operator (Episode 4): Named in the Episode 4 proposal for "OSINT" and "Information Gathering." |
| Hesam (حسام) | Threat Actor/Operator (Episode 4): Named in the Episode 4 proposal for "Recon." |
| Mohammad (محمد) | Threat Actor/Operator (Episode 4): Named in the Episode 4 proposal for "Recon." |
| Parham (پرهام) | Threat Actor/Operator (Episode 4): Named in the Episode 4 proposal for "Phishing Infrastructure." |
| Mohsen Foroughi | Potential Threat Actor/Operator (Episode 3): Name listed as the "buyer" on an invoice for the rental of multiple IP addresses. |
| JinS | Potential Operator/Tester (Episode 3): Username seen in a screenshot for the RAT-2Ac2 C2 panel. |
| Salman | Potential Victim (Episode 1): Name found in the Employees directory. |
| Hananeh Azizi | Potential Victim (Episode 1): Name found in the Employees directory. |
| Ameneh Dehghan | Potential Victim (Episode 1): Name found in the Employees directory. |
| Zahra Ansari | Potential Victim (Episode 1): Name found in the Employees directory. |
| Sedigheh Bagher | Potential Victim (Episode 1): Name found in the Employees directory. |
| Tayebeh Khodaverdi | Potential Victim (Episode 1): Name found in the Employees directory. |
| Atiyeh Naddafi | Potential Victim (Episode 1): Name found in the Employees directory. |
| Leila Sharifi | Potential Victim (Episode 1): Name found in the Employees directory. |
| Narges Naddafi | Potential Victim (Episode 1): Name found in the Employees directory. |
| Manouchehr Vosoughi Niri | Potential Victim (Episode 3): Name identified on a compromised Bank Mellat card. |
| Admin1@MFA | Compromised Account (Episode 3): Credential found in operator notes, used for lateral movement. |
| pfsenselondra@MFA | Compromised Account (Episode 3): Credential found in operator notes, used for lateral movement. |
The "Episode 2" leak contained a folder of daily reports from an operator identified as "Majid" or "MJD." Analysis of these reports provides a granular view of the day-to-day tasks involved in the group's campaigns. His activities include:
-
Campaign Preparation and Management:
- He is heavily involved in setting up and managing phishing and advertising campaigns on platforms like Google, Facebook, and Microsoft.
- This includes creating and configuring landing pages, setting up domains with Cloudflare, and troubleshooting issues with SSL certificates and hosting.
- He uses tools like
aecars.storefor templates and is involved in creating ad content, including images and videos.
-
Infrastructure and Account Management:
- He is responsible for procuring and managing various operational resources, including:
- Skype numbers and credit.
- Hosting services and domains from providers like Namecheap.
- Virtual Private Servers (VPS).
- SMS panels for bulk messaging.
- He deals with account suspensions and recovery, frequently interacting with Microsoft and Skype support.
- He is involved in setting up and managing payment methods for these services, including researching options for virtual credit cards and cryptocurrencies.
- He is responsible for procuring and managing various operational resources, including:
-
Social Media and Content Management:
- He is responsible for creating and scheduling content for social media platforms like Telegram, Facebook, and Twitter.
- He also engages in "interactive activities" on these platforms, likely to build a credible online presence for their campaigns.
-
OSINT and Vulnerability Research:
- He conducts Open Source Intelligence (OSINT) on targets, including the
iasa.co.ilorganization. - He researches vulnerabilities and their exploits, and is involved in testing them.
- He conducts Open Source Intelligence (OSINT) on targets, including the
-
Financial and Administrative Tasks:
- He is responsible for managing the financial aspects of the campaigns, including purchasing credit and handling payments.
- He also performs administrative tasks, such as documenting his work and preparing monthly reports.
Hossein's reports indicate a focus on the technical aspects of phishing operations and malware development.
-
Phishing Infrastructure:
- He is responsible for setting up and configuring the
mailwizzemail marketing application for phishing campaigns. - He integrates
mailwizzwith Amazon Simple Notification Service (SNS) to handle bounce and complaint notifications. - He is involved in troubleshooting issues with
mailwizz, including routing problems, cron jobs, and AWS SDK integration.
- He is responsible for setting up and configuring the
-
Malware Development and Evasion:
- He is working on techniques to embed and execute payloads in a stealthy manner.
- He is exploring methods like "Process Hollowing" and reflective loading to evade detection by security products.
- He is developing multi-threaded tools using
psexecandwmicfor remote execution. - He is working on session enumeration and creating hidden sessions to remain undetected on compromised systems.
The "Episode 2" leak contained a folder of daily reports from an operator identified as "Majid" or "MJD." Analysis of these reports provides a granular view of the day-to-day tasks involved in the group's campaigns. His activities include:
-
Campaign Preparation and Management:
- He is heavily involved in setting up and managing phishing and advertising campaigns on platforms like Google, Facebook, and Microsoft.
- This includes creating and configuring landing pages, setting up domains with Cloudflare, and troubleshooting issues with SSL certificates and hosting.
- He uses tools like
aecars.storefor templates and is involved in creating ad content, including images and videos.
-
Infrastructure and Account Management:
- He is responsible for procuring and managing various operational resources, including:
- Skype numbers and credit.
- Hosting services and domains from providers like Namecheap.
- Virtual Private Servers (VPS).
- SMS panels for bulk messaging.
- He deals with account suspensions and recovery, frequently interacting with Microsoft and Skype support.
- He is involved in setting up and managing payment methods for these services, including researching options for virtual credit cards and cryptocurrencies.
- He is responsible for procuring and managing various operational resources, including:
-
Social Media and Content Management:
- He is responsible for creating and scheduling content for social media platforms like Telegram, Facebook, and Twitter.
- He also engages in "interactive activities" on these platforms, likely to build a credible online presence for their campaigns.
-
OSINT and Vulnerability Research:
- He conducts Open Source Intelligence (OSINT) on targets, including the
iasa.co.ilorganization. - He researches vulnerabilities and their exploits, and is involved in testing them.
- He conducts Open Source Intelligence (OSINT) on targets, including the
-
Financial and Administrative Tasks:
- He is responsible for managing the financial aspects of the campaigns, including purchasing credit and handling payments.
- He also performs administrative tasks, such as documenting his work and preparing monthly reports.
This section details the findings from the "Episode 2" data leak, which appears to be a continuation of the activities detailed in the initial data set.
The new data includes additional attack reports and logs, mirroring the structure of the original leak. The reports indicate a continued focus on exploiting newly disclosed vulnerabilities and targeting high-value organizations.
A detailed review of the metadata from the "Episode 2" files confirms the continued use of anti-forensics techniques, though with some variations from the first dataset.
- Timestamp Manipulation: The practice of altering file timestamps is still prevalent. A majority of the new files share a single modification timestamp (
2025:10:03 18:50:33+02:00), strongly indicating a scripted process to obscure the true timeline of their creation and modification. - Absence of Previous Anomalies: Unlike the initial file set, the new PDF reports do not contain the anomalous
imagemagick.orgcreator string. The metadata in this regard is less remarkable. - New File Artifacts: This dataset includes numerous
.csvfiles within theAll_Proxy_Shell_Targetsdirectories. These files appear to be structured lists of IP addresses and other target-related data, suggesting a more organized approach to managing reconnaissance output compared to the simple.txtfiles seen previously.
The most significant finding in the new data is the group's rapid adoption and exploitation of CVE-2024-1709, a critical authentication bypass vulnerability in ConnectWise ScreenConnect. The reports show that the group began actively scanning for and exploiting this vulnerability on a global scale almost immediately after it was publicly disclosed.
The "Winter 1403" performance report highlights a significant evolution in the group's capabilities and ambitions, moving beyond simple web application exploitation to more complex and potentially disruptive operations.
- Focus on Deeper Penetration: The group is now focused on achieving "deep and precise" access, specifically targeting Active Directory environments for complete network takeovers.
- Evasion of Advanced Security: The report explicitly mentions successful efforts to bypass advanced EDR and security solutions, including SentinelOne, Sophos, and TrendMicro. This indicates a dedicated effort to test and refine their tools against modern security products.
- Supply Chain Attacks: The mention of "Supply Chain attacks" as a TTP is a significant development, suggesting a higher level of sophistication and a broader strategic objective.
- Targeting of OT/SCADA Systems: A screenshot within the report shows the operator accessing what appears to be an Industrial Control System (ICS) or SCADA system via VNC. The interface is in Hebrew, suggesting the target is in Israel. This is a critical finding, indicating a potential intent to target and disrupt operational technology.
- Infrastructure Development: The group is actively improving its own operational infrastructure, including building a dedicated lab for testing and refining exploits against various security products.
The "Episode 2" data revealed a significant number of new targets, primarily through the exploitation of the ConnectWise ScreenConnect vulnerability.
| Target | Country | Inferred Industry |
|---|---|---|
| 147.235.149.44 | Israel | Technology |
| 213.151.38.229 | Israel | Technology |
| 035565656.com | Israel | Unknown |
| benni.co.il | Israel | Corporate |
| compuall.co.il | Israel | IT Services |
| 158.101.230.195 | Saudi Arabia | Conglomerate (Axelerated Soloutions, Deutsche Gulf Finance, Hail Cement Company, Lean Business Solutions, National Water Company) |
This section details the findings from the "Episode 3" data leak.
The new data includes a new malware family named "BellaCiao," a collection of webshells and Python clients, and several documents.
A user manual for a Windows malware implant named "Sagheb" was discovered. This is a full-featured Remote Administration Tool (RAT) designed for espionage with a strong focus on stealth.
- Key Features:
- Stealth: Designed to be "Fully Un-Detectable" (FUD) and framework-independent (written in a native language like C++ or Delphi) to avoid common detection signatures.
- C2 Communication: It uses XOR encryption for its command and control traffic and routes it through custom relay servers and the TOR network to hide the C2 server's location.
- Functionality: The implant provides extensive capabilities managed via a web panel, including remote command execution, file system management (upload, download, encrypt), keylogging, screen capture, and data theft from Telegram and Firefox.
- Anti-Analysis: Incorporates anti-debugging techniques.
Another user manual detailed a second custom RAT named "RAT-2Ac2".
- Key Features:
- Architecture: It uses a client-server model. The client is written in C# and .NET 4, while the server is built with Python and Flask.
- C2 Communication: Communication occurs over HTTP/S. It uses a pre-shared secret in the HTTP header for authentication, returning a "Forbidden" error if the secret is missing, which helps protect the C2 server from analysis.
- Functionality: It provides a comprehensive set of RAT capabilities, including a keylogger, VNC remote desktop (using
boreandnoVNC), file transfer, screenshots, and command execution.
The dataset also includes a set of ASP webshells and Python clients.
- ASP Webshells: The webshells (
m0s.asp,file.asp,webshell.asp) are simple backdoors that execute commands received in theHTTP_ACCEPT_LANGUAGEheader. One of the webshells (m0s.asp) includes a custom decoding function to deobfuscate the commands. - Python Clients: The Python scripts (
connect.py,RCE4.py,rce5.py) are clients for the webshells. They provide a command-line interface for interacting with the webshells and include hardcoded target information. The identified targets includeuniforms.flydubai.com,193.188.88.156, andjordandesert.org.jo.
The file eposta.txt contains detailed notes from a threat actor who was targeting the Ministry of Foreign Affairs (MFA) of the Turkish Republic of Northern Cyprus. The notes include:
- Target Information: The target is identified as
eposta.mfa.gov.ct.tr. - Webshell URL: The attacker was using a webshell located at
https://eposta.mfa.gov.ct.tr/aspnet_client/system_web/aspnet_client.aspx. - Compromised Credentials: The notes contain credentials for two accounts:
Admin1@MFAandpfsenselondra@MFA. - Lateral Movement: The attacker used
wmicandnet useto move laterally within the MFA network. - Reverse Shell: The attacker used a tool named
vmware-tools.exeto create a reverse shell. - Postman: The attacker used Postman to send commands to the webshell.
The "Episode 3" data revealed several new targets and potential operator/compromised account names.
New Targets
| Target | Country | Inferred Industry |
|---|---|---|
| eposta.mfa.gov.ct.tr | Turkish Republic of Northern Cyprus | Government |
| dubaipolice (subdomain) | United Arab Emirates | Government |
| uniforms.flydubai.com | United Arab Emirates | Airlines |
| jordandesert.org.jo | Jordan | NGO |
| 193.188.88.156 | Unknown | Unknown |
New Personnel / Accounts
| Name | Likely Role/Skillset |
|---|---|
| Mohsen Foroughi | Potential Threat Actor/Operator: Name listed as the "buyer" on an invoice for the rental of multiple IP addresses. |
| JinS | Potential Operator/Tester: Username seen in a screenshot for the RAT-2Ac2 C2 panel. |
| Manouchehr Vosoughi Niri | Potential Victim: Name identified on a compromised Bank Mellat card. |
| Admin1@MFA | Compromised Account: Credential found in operator notes, used for lateral movement. |
| pfsenselondra@MFA | Compromised Account: Credential found in operator notes, used for lateral movement. |
This section details the findings from the "Episode 4" data leak, which provides an unprecedented view into the group's logistical and financial operations.
The new data consists primarily of CSV files acting as operational ledgers and PDF documents containing internal guides, credentials, and targeting information.
The CSV files represent a significant operational security failure, exposing the backbone of the group's activities.
0-SERVICE-Service.csv: This file is a master list of the group's infrastructure, detailing domains, hosting providers (Namecheap, NameSilo, PRQ.se, TheOnionHost), associated email accounts (primarily ProtonMail and Skiff), IP addresses, and plaintext credentials. It also tracks specific campaigns like "moses-staff" and "Abrahams Ax."0-SERVICE-payment BTC.csv: This file logs Bitcoin transactions used to fund their infrastructure. It includes dates, amounts, and numerous Bitcoin wallet addresses, providing valuable financial indicators.1-NET-Sheet1.csv: This file provides details of the group's physical network infrastructure within Iran, listing IP addresses for locations in Karaj, Marzdaran, and Qom, and identifying their ISPs.
The PDF files reveal internal training materials and targeting plans.
A2_AsImages.pdf: This is a detailed, step-by-step guide in Persian on how to set up a phishing campaign. It documents the use of SSH tunneling for obfuscation and a Django-based framework for generating and managing phishing links, demonstrating a standardized process for their phishing operations.Esxi 6.pdf&A1_AsImages.pdf: These documents contain extensive lists of plaintext credentials for internal servers (ESXi, Kerio Control, pfSense) and compromised services, likely related to targets in Dubai.طرح پیشنهادی - شرکت های فعال پزشکی مهندسی_AsImages.pdf: Titled "Proposal - Active Companies in Medical Engineering," this file is a clear targeting list, indicating a strategic focus on the medical engineering sector.
The infrastructure logs from Episode 4 contained a large number of email accounts used to register and manage services. These are likely aliases used by the operators.
| Alias / Email | Service(s) Used |
|---|---|
Meriyalee @ protonmail.com |
Hosting |
cybersonix @ protonmail.com |
Hosting, Domains |
May.Arnold @ protonmail.com |
Domains |
John.Porter857 @ protonmail.com |
Hosting |
Carlos.Patel @ protonmail.com |
DNS Services |
lolita259 @ proton.me |
SSL Certificates |
johnshopkinster @ protonmail.com |
Domains |
rona_yanga @ proton.me |
Hosting |
ronald.iverson @ protonmail.com |
Domains |
timothyefimov @ protonmail.com |
Hosting |
GDavies007 @ proton.me |
Hosting, Domains, SSL |
nansi.morad @ protonmail.com |
Hosting |
FannieFrankel @ proton.me |
Domains, Hosting |
juliusyermolayev @ protonmail.com |
Hosting |
Orval_Bernhard @ proton.me |
Domains |
Clark.Norman @ protonmail.com |
Hosting |
bashiriansul @ proton.me |
Hosting |
mlw.services.313 @ protonmail.com |
Hosting |
Rowling10 @ proton.me |
Domains, Hosting |
bakir.hamada @ proton.me |
VPS Hosting |
odette.margand568 @ protonmail.com |
Hosting |
The following Bitcoin wallet addresses were identified in the 0-SERVICE-payment BTC.csv file from Episode 4. They were used to pay for domains, hosting, and other operational infrastructure.
| Wallet Address | Associated Activity / Campaign |
|---|---|
3F2KWMSkjFdskQ2gV6pm4NA7JH2dx3jfCA |
General Infrastructure Payment |
16JMV9srqVDrK9u6z5cgKQjxnbJJp6gSxi |
Domain Purchase |
32HF3h685344uJe7RMhhp5s5oBjaQq6BQh |
SSL Certificate for "moses" campaign |
bc1q567mrap7x4mwva2wlea3x9nc78pgp7dxspe6su |
Hosting for "wazayef" campaign |
bc1qw0fqr597dqh3j8pe3c9gnl7vvkpgumxsak646g |
Domain Purchase ("ecomonist") |
3Ck5dxmGXG3u1i3H7CM4vBpTeohDweJuYL |
General Infrastructure Payment |
3DN4UZ8gTmoCDaWP7ejmDYj4ByTQmKkmwU |
General Infrastructure Payment |
383j9rbvXyf4ZVaTPLPB1QfpkDJZfMEziG |
General Infrastructure Payment |
3MCyrpDmEUAWjx5rg5L3uqcZDux6e9Ns78 |
General Infrastructure Payment |
bc1qmasss9tj2wcyr8vyjajhn8qu9xr3g9hl0r0ne7 |
General Infrastructure Payment ("haji") |
34bvn64Hn9rgwahJJVveh8xTgseLtY8KpJ |
General Infrastructure Payment |
bc1q2peh44qqjx9xg32xqfwzmrcrj42lean57vg6j4 |
General Infrastructure Payment |
3BMbdmfc9sKKEtX9EFKbxbS75xTuKEzRjF |
General Infrastructure Payment |
35eL5XLnKWbpJPdQGULvqhQpNQEkBSPisN |
General Infrastructure Payment |
bc1qxjmw2lknnne5hr0c4va2fjx0kzc9la4vhuaqex |
General Infrastructure Payment ("haji") |
13Ue2i4Pombmd1NUGKgT8P1SCm8jw5F2Kj |
General Infrastructure Payment |
1K93styPFkDGsTYnjgqaDN6xWy5NmUDLhh |
Domain Purchase ("gassam.su") |
19cChyRjku4zMKPr7PtkNSAdp9JE6AmiL2 |
Domain Purchase ("gassam.se") |
1HcPgNVrb7RvYkaGSu286qz2WF5UVBPP1R |
General Infrastructure Payment |
38Ai21L6mt7Qe2jnpxAZvjTLqKCYfjx9Am |
General Infrastructure Payment |
bc1qtf2a865s7ncxcsdcwee8yyyqjhhkk9nn7ww98q |
General Infrastructure Payment |
32LvatxLwVfxpteiJc14HCyDDv2t2BRfj5 |
General Infrastructure Payment |
31we2wugu5z7Mc3irnmZu9H7rXPrEqsuTf |
General Infrastructure Payment |
3Fv1X3we164eiBkme9wzHDU1iHpXuWcx8h |
General Infrastructure Payment |
bc1qfzke9vknxdvtm6yrkru3ddzfl74ducx7s6rke2 |
SMS Service Payment |
33PMgvq7HN8gdpd82WFCxKpVtsnSUWbLFx |
General Infrastructure Payment |
bc1q9a8k39xpxeflsetdw92mzd98kg7gpcwsm2malh |
General Infrastructure Payment |
bc1qpq0pk3xskqs70wg9werg3ypl8e255euzd5g4nq |
General Infrastructure Payment |
391baZHDES5TvotnYSnWwqnyYDXf2taWWb |
General Infrastructure Payment |
38SvFcEVRsfADhuxk7FS1p3TJfXYHewzGe |
General Infrastructure Payment |
bc1q7xk8vk2cttvz92xjh2r4tfry0964rvvedeqpls |
General Infrastructure Payment |
17cHK7neWyAq1imHgjc6wKqoX3gqPcUx4N |
General Infrastructure Payment |
The analysis of this dataset provides a rare and valuable glimpse into the inner workings of a sophisticated threat actor. The findings confirm that Charming Kitten is a well-resourced and highly motivated group with a clear mandate to conduct espionage and disruptive attacks against its perceived adversaries. The direct attribution of the "Moses-Staff" and "Qassam" personas to Charming Kitten, based on evidence from Episode 4, is a major development for the threat intelligence community. The latest data, while exposing their TTPs in greater detail, also highlights significant operational security failures, offering a unique opportunity for defenders to understand and counter their methods. The TTPs and targeting patterns identified in this report can be used to enhance defensive measures and to inform future threat intelligence efforts.