Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

AsyncRAT

8
Global rank
5 infographic chevron month
Month rank
9 infographic chevron week
Week rank
0
IOCs

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

RAT
Type
Likely Kuwait
Origin
8 January, 2019
First seen
17 December, 2025
Last seen

How to analyze AsyncRAT with ANY.RUN

RAT
Type
Likely Kuwait
Origin
8 January, 2019
First seen
17 December, 2025
Last seen

IOCs

IP addresses
20.111.27.231
193.32.126.240
91.193.75.20
143.198.143.112
178.16.53.10
178.16.53.55
132.145.75.68
195.3.223.146
82.65.19.134
198.23.227.175
87.242.106.13
72.10.160.170
45.138.16.206
184.190.169.22
45.81.23.27
157.20.182.18
193.161.193.99
147.50.253.97
91.151.88.159
74.50.94.175
Hashes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login.pureeats.in.net
91clubgamez.com
xvideox.za.com
malware.quality.it.com
monocastro0612.1cooldns.com
medcom.it.com
support.xvideox.za.com
register.spc.jp.net
grenki2005-34712.portmap.host
kissyou.ydns.eu
quality.it.com
beautiful-settings.gl.at.ply.gg
nkpoor.sa.com
malware.medcom.it.com
download.nkpoor.sa.com
v2.91clubgamez.com
syperzina52-35743.portmap.host
malware.91clubgamez.com
eye-bank.gl.at.ply.gg
tcp.cloudpub.ru
URLs
https://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/send
https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/send
https://api.telegram.org/bot5292408150:AAHAPbTr2Jc9L4hgsfkDkvfw_hISg6lPMMI/send
tcp://0.tcp.eu.ngrok.io/
tcp://2.tcp.eu.ngrok.io/
tcp://hieuanh-58355.portmap.host:58355/
tcp://hieuanh-49217.portmap.host:49217/
tcp://hieuanh-52625.portmap.host:52625/
tcp://hieuanh1-25700.portmap.host:25700/
tcp://hieuanh1-42498.portmap.host:42498/
tcp://4.tcp.ngrok.io/
tcp://HurensohnListe-31639.portmap.io/
https://api.telegram.org/bot5056556531:AAG9iGmK2jKw13ylU7MlMcVFjufBMeyCnUI/send
tcp://HurensohnListe-31639.portmap.io:31639/
tcp://4.tcp.eu.ngrok.io/
https://api.telegram.org/bot5578120367:AAGWyOK-DTL0bF8pwRmV8kQu24HbLZCy0Os/send
tcp://HurensohnListe-52132.portmap.io/
https://d0cf-47-149-75-215.ngrok.io/
http://standart-south.at.playit.gg/
https://pastebin.com/raw/mchxnAbT
Last Seen at

Recent blog posts

post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 121
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 268
comments 0
post image
AI Sigma Rules: Scale Threat Detection, Drive...
watchers 4543
comments 0

What is AsyncRAT malware

In 2019 and 2020, researchers observed the first campaigns distributing AsyncRAT. A modified version of the malware was arriving in spam email campaigns with mentions of the Covid-19 pandemic. In another tactic, attackers impersonated local banks and law enforcement institutions. The malware was gaining popularity and, in late 2020, surfaced in numerous threads in Chinese underground forums.

In 2021, AsyncRAT was spotted in a phishing campaign called Operation Spalax. In an unrelated incident, it was dropped by an HCrypt loader. Soon after, researchers saw the first strain of AsyncRAT loading using VBScripts. And in 2022, a heavily modified version of the malware appeared, which was spread in a spear phishing campaign using an attachment that downloaded ISO files. This strain could bypass most security measures.

Because of the open-sourced nature of this malware, attackers have developed numerous alterations of AsyncRAT throughout its lifetime. In 2022, researchers found a new variant that can be distributed in fileless form. It is thought to spread through email using compressed file attachments.

AsyncRAT mainly infects victims in the IT, hospitality, and transportation industries across North, South, and Central America, though its distribution is not limited to these regions. RAT users aim to steal personal credentials or banking details and use them as leverage to demand ransom.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How to analyze AsyncRAT malware

Researchers can analyze AsyncRAT sample, track the whole execution process, and collect IOCs in real-time using ANY.RUN sandbox.

AsyncRAT process tree

Figure 1: AsyncRAT process tree in ANY.RUN

AsyncRAT execution process

Just like any other malware, the execution process of AsyncRAT may vary and change over time and versions. As mentioned before, its open-source origin made it easy to change its functionality. The execution process is plain and straightforward, just like a lot of other malware. This RAT may make just a single process on the infected system or infects system processes.

AsyncRAT malware configuration

Figure 2: AsyncRAT malware configuration extracted by ANY.RUN

In our example, the AsyncRAT execution chain started from a malicious document that dropped a payload. After that, malware added itself to autorun and made a little sleep through timeout. In the end, AsyncRAT ran itself as a child process and tried to connect to C2. Malware configuration was successfully extracted from the sample, so analysts can save a lot of time on manual steps.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

How to detect AsyncRAT using ANY.RUN?

The oldest versions of AsyncRAT were identified by writing the key and name D04F4D4D0DF87BA77AAE in the registry. The newest version of the malicious program sends the stolen info to its panel just right after the start of the execution. The detection will happen after less than a minute. Apart from that, AsyncRAT is caught by YARA rules.

Gathering threat intelligence on AsyncRAT malware

To collect up-to-date intelligence on AsyncRAT, use Threat Intelligence Lookup.

This service gives you access to a vast database filled with insights from millions of malware analysis sessions conducted in the ANY.RUN sandbox.

With over 40 customizable search parameters, including IPs, domains, file names, and process artifacts, you can efficiently gather relevant data on threats like AsyncRAT.

AsyncRAT ANY.RUN Search results for AsyncRAT in Threat Intelligence Lookup

For example, you can search directly for the threat name or use related indicators like hash values or network connections. Submitting a query such as threatName:"asyncrat" AND domainName:"" will generate a list of files, events, domain names, and other data extracted from AsyncRAT samples along with sandbox sessions that you can explore in detail to gain comprehensive insights into this malware’s behavior.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Distribution of AsyncRAT

AsyncRAT uses a couple of distribution methods. It is usually spread with spam email campaigns as malicious attachments or via infected ads on compromised websites. Sometimes the RAT is dropped by other malware, which first infects the system through a VBS script. The Threat Analysis Unit also warned that it can arrive via exploit kits.

Conclusion

It’s difficult to say whether the original release of AsyncRAT was meant to be a harmless remote administration tool. The notes claimed that it was designed for educational purposes. But it could be that the creator simply found a clever way to market malware on a legitimate site.

Regardless of the intent, the code uploaded to GitHub already had enough malicious capabilities to cause monetary losses to organizations. Since then, it has been heavily modified to support countless distribution methods, including fileless delivery, making this RAT highly dangerous.

But researchers can easily identify any of its strains by running an analysis in ANY.RUN sandbox. It takes only 2 minutes on average to launch an emulation, diagnose AsyncRAT and collect indicators of compromise.

Create your free ANY.RUN account to analyze malware and phishing without limits!

HAVE A LOOK AT

MassLogger screenshot
MassLogger
masslogger
MassLogger is a credential stealer and keylogger first identified in April 2020. It has been actively used in cyber campaigns to exfiltrate sensitive information from compromised systems. It is designed for easy use by less tech-savvy actors and is prominent for the capability of spreading via USB drives. It targets both individuals and organizations in various industries, mostly in Europe and the USA.
Read More
FatalRAT screenshot
FatalRAT
fatalrat
FatalRAT is a malware that gives hackers remote access and control of the system and lets them steal sensitive information like login credentials and financial data. FatalRAT has been associated with cyber espionage campaigns, particularly targeting organizations in the Asia-Pacific (APAC) region.
Read More
NetSupport RAT screenshot
NetSupport RAT
netsupport
NetSupport RAT is a malicious adaptation of the legitimate NetSupport Manager, a remote access tool used for IT support, which cybercriminals exploit to gain unauthorized control over systems. It has gained significant traction due to its sophisticated evasion techniques, widespread distribution campaigns, and the challenge it poses to security professionals who must distinguish between legitimate and malicious uses of the underlying software.
Read More
Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More
Cerber screenshot
Cerber
cerber
Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss.
Read More
RedLine screenshot
RedLine
redline stealer redline stealer malware
RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.
Read More