A sophisticated cyberespionage campaign leveraging malicious Microsoft Management Console (MMC) scripts to deploy the stealthy MysterySnail remote access trojan (RAT).
First identified in 2021 during an investigation into the CVE-2021-40449 zero-day vulnerability, MysterySnail RAT had seemingly disappeared from the cyber threat landscape.
Attributed to the Chinese-speaking threat actor known as IronHusky, which has operated since at least 2017, this malware has apparently remained active but undetected for years.
“It turned out that the implant has been actively used in cyberattacks all these years although not reported,” Kaspersky said.
The attack begins with a malicious MMC script disguised as a document from Mongolia’s National Land Agency (ALAMGAC). This social engineering tactic increases the likelihood that government targets will open the disguised file.
Once executed, the script initiates a multi-stage infection process. First, it retrieves a ZIP archive containing a second-stage payload and a legitimate DOCX file from file[.]io storage.
The archive is extracted to a specific directory: %AppData%\Cisco\Plugins\X86\bin\etc\Update
A legitimate executable (CiscoCollabHost.exe) is launched, which loads a malicious library (CiscoSparkLauncher.dll) through DLL sideloading.
Further, persistence is established through registry modifications and the lure document opens to avoid raising suspicion.
The researchers identified an innovative intermediary backdoor that communicates with command-and-control (C2) servers by abusing the open-source piping-server project.
In an unusual anti-analysis technique, the backdoor stores Windows API function information in an external file (log\MYFC.log), which is encrypted with single-byte XOR and loaded at runtime.
The backdoor communicates with https://ppng.io to receive commands including:
The latest version maintains persistence as a service and uses sophisticated encryption techniques. Its malicious DLL loads a payload encrypted with RC4 and XOR from a file named attach.dat, and employs reflective loading through DLL hollowing using the run_pe library.
Communications have been observed with multiple attacker-controlled domains including watch-smcsvc[.]com and leotolstoys[.]com.
Unlike its 2021 predecessor, which implemented approximately 40 commands in a single component, the new MysterySnail employs a modular architecture with five specialized DLLs downloaded at runtime:
Researchers also discovered a lightweight variant dubbed “MysteryMonoSnail” that communicates via WebSocket protocol instead of HTTP and offers reduced functionality with just 13 basic commands.
This reemergence highlights the importance of maintaining vigilance against dormant threats.
“While conducting threat hunting activities, it’s crucial to consider that old malware families, which have not been reported on for years, may continue their activities under the radar,” warn researchers.
The case of MysterySnail demonstrates how threat actors can maintain operational persistence by making minimal modifications to existing malware, allowing them to remain undetected for extended periods.
Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy
Microsoft has warned organizations worldwide that threat actors are ramping up their exploitation of critical…
In the modern digital landscape, organizations are constantly challenged by an ever-increasing volume of security…
In today's rapidly evolving cyber threat landscape, Security Operations Centers (SOCs) face an unprecedented challenge:…
Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated…
A server briefly linked to the notorious KeyPlug malware has inadvertently exposed a comprehensive arsenal…
The rapid evolution of generative AI has fundamentally transformed the landscape of cybersecurity, especially in…