Cyber Security News

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial sample (MD5 14f6c034af7322156e62a6c961106a8c) provided valuable insights into its version and development timeline. 

A second suspicious sample on the same machine, while exhibiting similar functionality to BellaCiao, was a C++ reimplementation of an older version, suggesting a potential evolution in the attacker’s tactics, techniques, and procedures. 

BellaCiao utilizes PDB paths with descriptive elements, revealing critical campaign details such as the targeted entity and country, while historical samples consistently identify the string “MicrosoftAgentServices” within these PDB paths. 

Some samples exhibit numerical suffixes like “MicrosoftAgentServices2” or “MicrosoftAgentServices3,” strongly suggesting versioning practices by the malware developer, which likely serves to differentiate distinct iterations or updates of the malware. 

Such versioning practices likely aid the APT actor in tracking development, implementing changes to the malware’s capabilities, and maintaining a diverse and evolving arsenal to effectively achieve their campaign objectives.

The data reveals a compilation history for a software component, likely within the “MicrosoftAgentServices” project, where the initial samples (prior to the “versioning system” – likely a folder structure or naming convention) suggest an early, less structured development phase. 

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Subsequently, the introduction of “MicrosoftAgentServices2” and “MicrosoftAgentServices3” indicates a shift towards a more organized and potentially iterative development process, which is further supported by the increasing frequency of compilations within each versioned directory.

The timestamps associated with each compilation provide insights into the project’s development timeline and the pace of activity within different development stages.

BellaCPP, a C++-based DLL, installs itself as a Windows service, which decrypts strings related to system updates and DNS checks by generating a domain name based on a template and querying it for a specific IP address. 

If the query matches the expected IP, it calls a function likely for command and control communication, passing credentials, domain information, and port numbers, which closely aligns with previous .NET-based BellaCiao malware variants, suggesting shared functionality and potential origins.

The analysis encountered difficulties in retrieving the D3D12_1core.dll file, hindering the direct examination of the SecurityUpdate function’s behavior within the C++ BellaCPP sample. 

By observing similarities with the .NET-based BellaCiao samples, it was determined that the missing DLL likely establishes an SSH tunnel, which is supported by the fact that the C++ sample utilizes a domain generation pattern similar to BellaCiao, where the IP address resolution dictates subsequent actions. 

While the C++ sample lacks a hardcoded webshell, the observed behavior strongly suggests the creation of an SSH tunnel, potentially for remote access or data exfiltration.

Kasperky analysis of the BellaCPP sample, a C++ variant of the BellaCiao malware, strongly suggests an association with the Charming Kitten threat actor, where key indicators include the use of previously attributed domains, similar domain generation techniques, and the presence of older BellaCiao samples on the infected machine. 

This discovery emphasizes the need for comprehensive network investigations to identify and mitigate the presence of potentially undetected malware variants, such as BellaCPP, deployed by adversaries like Charming Kitten.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also come…

2 minutes ago

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers to…

2 minutes ago

Nnice Ransomware Attacking Windows Systems With Advanced Encryption Techniques

CYFIRMA's Research and Advisory team has identified a new strain of ransomware labeled "Nnice," following…

4 minutes ago

Microsoft Unveils New Identity Secure Score Recommendations in General Availability

Microsoft has announced the general availability of 11 new Identity Secure Score recommendations in Microsoft…

5 minutes ago

Hackers Deliver Ransomware on Windows Via Microsoft Teams Voice Calls

Sophos X-Ops’ Managed Detection and Response (MDR) team has uncovered two highly active threat actor…

1 hour ago

SonicWall Arbitrary OS Commands Execution Vulnerability Exploited in Attacks

 A critical vulnerability in SonicWall's SMA1000 series tracked as CVE-2025-23006, has come under active exploitation by…

2 hours ago