New version of MysterySnail RAT and lightweight MysteryMonoSnail backdoor

April 17, 2025, 3:09 p.m.

Description

A new version of the MysterySnail RAT, attributed to the Chinese-speaking IronHusky APT group, has been detected targeting government organizations in Mongolia and Russia. The malware, which hadn't been publicly reported since 2021, now features a modular architecture with five additional DLL modules for command execution. A lightweight version dubbed MysteryMonoSnail was also observed. The infection chain involves a malicious MMC script, an intermediary backdoor, and the main MysterySnail RAT payload. The attackers use public file storage and the piping-server project for command and control. This case highlights the importance of maintaining vigilance against seemingly obsolete malware families, as they may continue operating undetected for extended periods.

Date

  • Created: April 17, 2025, 1:06 p.m.
  • Published: April 17, 2025, 1:06 p.m.
  • Modified: April 17, 2025, 3:09 p.m.

Indicators

  • watch-smcsvc.com
  • leotolstoys.com

Attack Patterns

  • MysteryMonoSnail
  • MysterySnail RAT
  • IronHusky

Additional Informations

  • Government
  • Mongolia
  • Russian Federation

Linked vulnerabilities