New version of MysterySnail RAT and lightweight MysteryMonoSnail backdoor
April 17, 2025, 3:09 p.m.
Description
A new version of the MysterySnail RAT, attributed to the Chinese-speaking IronHusky APT group, has been detected targeting government organizations in Mongolia and Russia. The malware, which hadn't been publicly reported since 2021, now features a modular architecture with five additional DLL modules for command execution. A lightweight version dubbed MysteryMonoSnail was also observed. The infection chain involves a malicious MMC script, an intermediary backdoor, and the main MysterySnail RAT payload. The attackers use public file storage and the piping-server project for command and control. This case highlights the importance of maintaining vigilance against seemingly obsolete malware families, as they may continue operating undetected for extended periods.
Tags
Date
- Created: April 17, 2025, 1:06 p.m.
- Published: April 17, 2025, 1:06 p.m.
- Modified: April 17, 2025, 3:09 p.m.
Additional Informations
- Government
- Mongolia
- Russian Federation