IronHusky APT Revives MysterySnail RAT to Target Government Organizations in Russia and Mongolia

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

A recent security analysis has unearthed a new version of the MysterySnail Remote Access Trojan (RAT), marking its re-emergence in targeted cyberattacks against government entities in Mongolia and Russia. 

Originally uncovered in 2021, MysterySnail RAT was attributed to the IronHusky advanced persistent threat (APT) group, a China-based actor with a history of targeting these regions.

The original MysterySnail RAT gained attention when it exploited the CVE-2021-40449 zero-day vulnerability. Since then, no public activity related to the malware had been observed until Kaspersky researchers detected its resurgence in recent months. 

Malicious MMC script as displayed in Windows Explorer. It has the icon of a Microsoft Word document
Malicious MMC script as displayed in Windows Explorer. It has the icon of a Microsoft Word document | Source: Kaspersky

The new version of the RAT demonstrates continuity in IronHusky’s targeting priorities, maintaining a focus on government organizations in Mongolia and Russia, Kaspersky’s Global Research & Analysis Team (GReAT) said in a recent report.

The new version of MysterySnail RAT is delivered through a disguised malicious Microsoft Management Console (MMC) script. 

This script, masked as a legitimate document from Mongolia’s National Land Agency (ALAMGAC), initiates a series of actions:

The MMC script was designed to minimize user suspicion by opening the decoy document for the victim while deploying the malware in the background.

An intermediary backdoor was discovered within the attack chain, leveraging DLL sideloading techniques. The backdoor communicates with its operators via a legitimate open-source tool, the Piping server, utilizing it for command-and-control (C2) communication. 

The intermediary backdoor supports a range of malicious commands, such as running command shells, managing files, and terminating itself.

The latest version of MysterySnail RAT introduces a modular architecture for executing commands. This marks a significant evolution from the 2021 version, which consolidated functions into a single component. 

The modular design leverages five distinct modules, each handling specific tasks such as file management, process execution, and network connections.

While the modular approach offers greater execution flexibility, researchers noted that certain characteristics, such as coding typos, remain consistent with earlier versions, reinforcing the connection to the 2021 variant.

Further analysis unveiled a lightweight variant of the RAT, dubbed MysteryMonoSnail. Unlike its modular predecessor, this version consists of a single component and communicates with its C2 server using WebSocket protocols rather than HTTP. 


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: