Cyber Security News

Hackers Weaponize MMC Script to Deploy MysterySnail RAT Malware

A sophisticated cyberespionage campaign leveraging malicious Microsoft Management Console (MMC) scripts to deploy the stealthy MysterySnail remote access trojan (RAT). 

First identified in 2021 during an investigation into the CVE-2021-40449 zero-day vulnerability, MysterySnail RAT had seemingly disappeared from the cyber threat landscape. 

Attributed to the Chinese-speaking threat actor known as IronHusky, which has operated since at least 2017, this malware has apparently remained active but undetected for years.

“It turned out that the implant has been actively used in cyberattacks all these years although not reported,” Kaspersky said.

Sophisticated Infection Chain

The attack begins with a malicious MMC script disguised as a document from Mongolia’s National Land Agency (ALAMGAC). This social engineering tactic increases the likelihood that government targets will open the disguised file.

Once executed, the script initiates a multi-stage infection process. First, it retrieves a ZIP archive containing a second-stage payload and a legitimate DOCX file from file[.]io storage.

The archive is extracted to a specific directory: %AppData%\Cisco\Plugins\X86\bin\etc\Update

A legitimate executable (CiscoCollabHost.exe) is launched, which loads a malicious library (CiscoSparkLauncher.dll) through DLL sideloading.

Further, persistence is established through registry modifications and the lure document opens to avoid raising suspicion.

The researchers identified an innovative intermediary backdoor that communicates with command-and-control (C2) servers by abusing the open-source piping-server project. 

In an unusual anti-analysis technique, the backdoor stores Windows API function information in an external file (log\MYFC.log), which is encrypted with single-byte XOR and loaded at runtime.

The backdoor communicates with https://ppng.io to receive commands including:

  • RCOMM: Runs command shells.
  • FSEND: Downloads files from C2.
  • FRECV: Uploads files to C2.
  • FEXEC: Creates new processes.
  • FDELE: Deletes files.

Evolved MysterySnail RAT

The latest version maintains persistence as a service and uses sophisticated encryption techniques. Its malicious DLL loads a payload encrypted with RC4 and XOR from a file named attach.dat, and employs reflective loading through DLL hollowing using the run_pe library.

Communications have been observed with multiple attacker-controlled domains including watch-smcsvc[.]com and leotolstoys[.]com.

Unlike its 2021 predecessor, which implemented approximately 40 commands in a single component, the new MysterySnail employs a modular architecture with five specialized DLLs downloaded at runtime:

  • BasicMod.dll: Handles drive listing, file deletion, and system fingerprinting.
  • ExplorerMoudleDll.dll: Manages file reading, service administration, and process creation.
  • process.dll: Lists and terminates running processes.
  • cmd.dll: Creates processes and command shells.
  • tcptran.dll: Manages network connections.

Researchers also discovered a lightweight variant dubbed “MysteryMonoSnail” that communicates via WebSocket protocol instead of HTTP and offers reduced functionality with just 13 basic commands.

This reemergence highlights the importance of maintaining vigilance against dormant threats. 

“While conducting threat hunting activities, it’s crucial to consider that old malware families, which have not been reported on for years, may continue their activities under the radar,” warn researchers.

The case of MysterySnail demonstrates how threat actors can maintain operational persistence by making minimal modifications to existing malware, allowing them to remain undetected for extended periods.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

Hackers Actively Exploiting Critical Exchange & SharePoint Server Vulnerabilities

Microsoft has warned organizations worldwide that threat actors are ramping up their exploitation of critical…

31 minutes ago

How to Implementing SOAR To Reduce Incident Response Time Effectively

In the modern digital landscape, organizations are constantly challenged by an ever-increasing volume of security…

6 hours ago

How To Prioritize Threat Intelligence Alerts In A High-Volume SOC

In today's rapidly evolving cyber threat landscape, Security Operations Centers (SOCs) face an unprecedented challenge:…

6 hours ago

Detecting And Responding To New Nation-State Persistence Techniques

Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated…

6 hours ago

Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN

A server briefly linked to the notorious KeyPlug malware has inadvertently exposed a comprehensive arsenal…

10 hours ago

How Generative AI is Changing Red Team Tactics

The rapid evolution of generative AI has fundamentally transformed the landscape of cybersecurity, especially in…

13 hours ago