Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

AsyncRAT

13
Global rank
14 infographic chevron month
Month rank
11 infographic chevron week
Week rank
0
IOCs

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

RAT
Type
Likely Kuwait
Origin
8 January, 2019
First seen
7 November, 2025
Last seen

How to analyze AsyncRAT with ANY.RUN

RAT
Type
Likely Kuwait
Origin
8 January, 2019
First seen
7 November, 2025
Last seen

IOCs

IP addresses
20.111.27.231
193.32.126.240
91.193.75.20
196.251.86.112
196.251.81.117
196.251.118.4
196.251.80.153
196.251.116.191
196.251.81.21
196.251.116.162
93.123.109.39
213.152.161.100
185.234.72.186
198.23.227.140
87.249.134.1
213.152.161.233
46.246.82.18
45.134.142.193
147.185.221.212
198.244.216.42
Hashes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xoilaczzzoz.tv
caiunotrojan.ddns.net
gatex.xoilaczzzhz.tv
darktide.live
drpolok.duckdns.org
i4b2.gay
nopirate1990.dynuddns.net
syria3.ddnsfree.com
medellin12345.duckdns.org
8services2point0.com
gatex.antiracistusa.org
guestsalerts.com
anyone-recover.gl.at.ply.gg
apartmenr-di15.click
mznvqiweurty.click
qpwalskdjzmx.click
lkjzmxnqpwer.click
qowuensmzxcv.click
qpeuwmxnzvka.click
asdkjczxmeuw.click
URLs
https://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/send
https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/send
https://api.telegram.org/bot5292408150:AAHAPbTr2Jc9L4hgsfkDkvfw_hISg6lPMMI/send
tcp://0.tcp.eu.ngrok.io/
tcp://2.tcp.eu.ngrok.io/
tcp://hieuanh-58355.portmap.host:58355/
tcp://hieuanh-49217.portmap.host:49217/
tcp://hieuanh-52625.portmap.host:52625/
tcp://hieuanh1-25700.portmap.host:25700/
tcp://hieuanh1-42498.portmap.host:42498/
tcp://4.tcp.ngrok.io/
tcp://HurensohnListe-31639.portmap.io/
https://api.telegram.org/bot5056556531:AAG9iGmK2jKw13ylU7MlMcVFjufBMeyCnUI/send
tcp://HurensohnListe-31639.portmap.io:31639/
tcp://4.tcp.eu.ngrok.io/
https://api.telegram.org/bot5578120367:AAGWyOK-DTL0bF8pwRmV8kQu24HbLZCy0Os/send
tcp://HurensohnListe-52132.portmap.io/
https://d0cf-47-149-75-215.ngrok.io/
http://standart-south.at.playit.gg/
https://pastebin.com/raw/mchxnAbT
Last Seen at
Last Seen at

Recent blog posts

post image
ANY.RUN Wins Trailblazing Threat Intelligence...
watchers 200
comments 0
post image
Unified Security for Fast Response: All ANY.R...
watchers 397
comments 0
post image
Release Notes: ANY.RUN & ThreatQ Integrat...
watchers 1830
comments 0

What is AsyncRAT malware

In 2019 and 2020, researchers observed the first campaigns distributing AsyncRAT. A modified version of the malware was arriving in spam email campaigns with mentions of the Covid-19 pandemic. In another tactic, attackers impersonated local banks and law enforcement institutions. The malware was gaining popularity and, in late 2020, surfaced in numerous threads in Chinese underground forums.

In 2021, AsyncRAT was spotted in a phishing campaign called Operation Spalax. In an unrelated incident, it was dropped by an HCrypt loader. Soon after, researchers saw the first strain of AsyncRAT loading using VBScripts. And in 2022, a heavily modified version of the malware appeared, which was spread in a spear phishing campaign using an attachment that downloaded ISO files. This strain could bypass most security measures.

Because of the open-sourced nature of this malware, attackers have developed numerous alterations of AsyncRAT throughout its lifetime. In 2022, researchers found a new variant that can be distributed in fileless form. It is thought to spread through email using compressed file attachments.

AsyncRAT mainly infects victims in the IT, hospitality, and transportation industries across North, South, and Central America, though its distribution is not limited to these regions. RAT users aim to steal personal credentials or banking details and use them as leverage to demand ransom.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How to analyze AsyncRAT malware

Researchers can analyze AsyncRAT sample, track the whole execution process, and collect IOCs in real-time using ANY.RUN sandbox.

AsyncRAT process tree

Figure 1: AsyncRAT process tree in ANY.RUN

AsyncRAT execution process

Just like any other malware, the execution process of AsyncRAT may vary and change over time and versions. As mentioned before, its open-source origin made it easy to change its functionality. The execution process is plain and straightforward, just like a lot of other malware. This RAT may make just a single process on the infected system or infects system processes.

AsyncRAT malware configuration

Figure 2: AsyncRAT malware configuration extracted by ANY.RUN

In our example, the AsyncRAT execution chain started from a malicious document that dropped a payload. After that, malware added itself to autorun and made a little sleep through timeout. In the end, AsyncRAT ran itself as a child process and tried to connect to C2. Malware configuration was successfully extracted from the sample, so analysts can save a lot of time on manual steps.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

How to detect AsyncRAT using ANY.RUN?

The oldest versions of AsyncRAT were identified by writing the key and name D04F4D4D0DF87BA77AAE in the registry. The newest version of the malicious program sends the stolen info to its panel just right after the start of the execution. The detection will happen after less than a minute. Apart from that, AsyncRAT is caught by YARA rules.

Gathering threat intelligence on AsyncRAT malware

To collect up-to-date intelligence on AsyncRAT, use Threat Intelligence Lookup.

This service gives you access to a vast database filled with insights from millions of malware analysis sessions conducted in the ANY.RUN sandbox.

With over 40 customizable search parameters, including IPs, domains, file names, and process artifacts, you can efficiently gather relevant data on threats like AsyncRAT.

AsyncRAT ANY.RUN Search results for AsyncRAT in Threat Intelligence Lookup

For example, you can search directly for the threat name or use related indicators like hash values or network connections. Submitting a query such as threatName:"asyncrat" AND domainName:"" will generate a list of files, events, domain names, and other data extracted from AsyncRAT samples along with sandbox sessions that you can explore in detail to gain comprehensive insights into this malware’s behavior.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Distribution of AsyncRAT

AsyncRAT uses a couple of distribution methods. It is usually spread with spam email campaigns as malicious attachments or via infected ads on compromised websites. Sometimes the RAT is dropped by other malware, which first infects the system through a VBS script. The Threat Analysis Unit also warned that it can arrive via exploit kits.

Conclusion

It’s difficult to say whether the original release of AsyncRAT was meant to be a harmless remote administration tool. The notes claimed that it was designed for educational purposes. But it could be that the creator simply found a clever way to market malware on a legitimate site.

Regardless of the intent, the code uploaded to GitHub already had enough malicious capabilities to cause monetary losses to organizations. Since then, it has been heavily modified to support countless distribution methods, including fileless delivery, making this RAT highly dangerous.

But researchers can easily identify any of its strains by running an analysis in ANY.RUN sandbox. It takes only 2 minutes on average to launch an emulation, diagnose AsyncRAT and collect indicators of compromise.

Create your free ANY.RUN account to analyze malware and phishing without limits!

HAVE A LOOK AT

Lynx screenshot
Lynx
lynx
Lynx is a double extortion ransomware: attackers encrypt important and sensitive data and demand a ransom for decryption simultaneously threatening to publish or sell the data. Active since mid-2024. Among techniques are terminating processes and services, privilege escalation, deleting shadow copies. Distribution by phishing, malvertising, exploiting vulnerabilities.
Read More
Grandoreiro screenshot
Grandoreiro
grandoreiro
Grandoreiro is a Latin American banking trojan first observed in 2016. It targets mostly Spanish-speaking countries, such as Brazil, Spain, Mexico and Peru. This malware is operated as a Malware-as-a-Service (MaaS), which makes it easily accessible for cybercriminals. Besides, it uses advanced techniques to evade detection.
Read More
Razr screenshot
Razr
razr
Razr is a destructive ransomware that infiltrates systems to encrypt files, rendering them inaccessible to users. It appends the ".razr" extension to the encrypted files and drops a ransom note, typically named "README.txt," instructing victims on how to pay the ransom to obtain the decryption key. The malware often spreads through phishing emails with malicious attachments or by exploiting vulnerabilities in software and operating systems. Razr employs strong encryption algorithms, making it challenging to decrypt files without the attackers' key.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Orcus RAT screenshot
Orcus RAT
orcus rat trojan
Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.
Read More
Spyware screenshot
Spyware
spyware
Spyware is a stealth form of malware whose primary objective is to gather sensitive information, such as personal data, login credentials, and financial details, by monitoring user activities and exploiting system vulnerabilities. Spyware operates secretly in the background, evading detection while transmitting collected data to cybercriminals, who can then use it for malicious purposes like identity theft, financial fraud, or espionage.
Read More