Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

AsyncRAT

13
Global rank
22 infographic chevron month
Month rank
26 infographic chevron week
Week rank
0
IOCs

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

RAT
Type
Likely Kuwait
Origin
8 January, 2019
First seen
18 October, 2025
Last seen

How to analyze AsyncRAT with ANY.RUN

RAT
Type
Likely Kuwait
Origin
8 January, 2019
First seen
18 October, 2025
Last seen

IOCs

IP addresses
20.111.27.231
193.32.126.240
91.193.75.20
128.90.106.203
185.81.157.24
216.170.126.139
185.81.157.149
185.246.113.191
45.140.146.29
37.120.208.40
193.56.29.251
193.161.193.99
179.43.140.208
185.189.112.27
3.125.102.39
45.15.143.191
178.175.142.195
46.246.82.12
3.69.157.220
185.239.242.76
Hashes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payhostmsa.shop
lender-router-exclusively-fraction.trycloudflare.com
rvt50mekz.localto.net
remproces.casacam.net
fiologo.ydns.eu
v2.cntm.edu.vn
cntm.edu.vn
envio08-10.duckdns.org
old0monedy.info
blue.o7lab.me
guestsalerts.com
captchaguard.me
xoilaczzzaz.tv
alemania2059.duckdns.org
v1.cntm.edu.vn
prakashjadhav.dynu.net
case-sa.gl.at.ply.gg
1209forward1209.dns.army
carloslopezsas2025.casacam.net
apartmenr-di15.click
URLs
https://api.telegram.org/bot1784055443:AAG-bXLYtnFpjJ_L3ogxA3bq6Mx09cqh8ug/send
https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/send
https://api.telegram.org/bot5292408150:AAHAPbTr2Jc9L4hgsfkDkvfw_hISg6lPMMI/send
tcp://0.tcp.eu.ngrok.io/
tcp://2.tcp.eu.ngrok.io/
tcp://hieuanh-58355.portmap.host:58355/
tcp://hieuanh-49217.portmap.host:49217/
tcp://hieuanh-52625.portmap.host:52625/
tcp://hieuanh1-25700.portmap.host:25700/
tcp://hieuanh1-42498.portmap.host:42498/
tcp://4.tcp.ngrok.io/
tcp://HurensohnListe-31639.portmap.io/
https://api.telegram.org/bot5056556531:AAG9iGmK2jKw13ylU7MlMcVFjufBMeyCnUI/send
tcp://HurensohnListe-31639.portmap.io:31639/
tcp://4.tcp.eu.ngrok.io/
https://api.telegram.org/bot5578120367:AAGWyOK-DTL0bF8pwRmV8kQu24HbLZCy0Os/send
tcp://HurensohnListe-52132.portmap.io/
https://d0cf-47-149-75-215.ngrok.io/
http://standart-south.at.playit.gg/
https://pastebin.com/raw/mchxnAbT
Last Seen at
Last Seen at

Recent blog posts

post image
5 Ways Threat Intelligence Saves Businesses M...
watchers 373
comments 0
post image
New Malware Tactics: Cases & Detection Ti...
watchers 1502
comments 0
post image
How to Grow SOC Team Expertise for Ultimate T...
watchers 742
comments 0

What is AsyncRAT malware

In 2019 and 2020, researchers observed the first campaigns distributing AsyncRAT. A modified version of the malware was arriving in spam email campaigns with mentions of the Covid-19 pandemic. In another tactic, attackers impersonated local banks and law enforcement institutions. The malware was gaining popularity and, in late 2020, surfaced in numerous threads in Chinese underground forums.

In 2021, AsyncRAT was spotted in a phishing campaign called Operation Spalax. In an unrelated incident, it was dropped by an HCrypt loader. Soon after, researchers saw the first strain of AsyncRAT loading using VBScripts. And in 2022, a heavily modified version of the malware appeared, which was spread in a spear phishing campaign using an attachment that downloaded ISO files. This strain could bypass most security measures.

Because of the open-sourced nature of this malware, attackers have developed numerous alterations of AsyncRAT throughout its lifetime. In 2022, researchers found a new variant that can be distributed in fileless form. It is thought to spread through email using compressed file attachments.

AsyncRAT mainly infects victims in the IT, hospitality, and transportation industries across North, South, and Central America, though its distribution is not limited to these regions. RAT users aim to steal personal credentials or banking details and use them as leverage to demand ransom.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How to analyze AsyncRAT malware

Researchers can analyze AsyncRAT sample, track the whole execution process, and collect IOCs in real-time using ANY.RUN sandbox.

AsyncRAT process tree

Figure 1: AsyncRAT process tree in ANY.RUN

AsyncRAT execution process

Just like any other malware, the execution process of AsyncRAT may vary and change over time and versions. As mentioned before, its open-source origin made it easy to change its functionality. The execution process is plain and straightforward, just like a lot of other malware. This RAT may make just a single process on the infected system or infects system processes.

AsyncRAT malware configuration

Figure 2: AsyncRAT malware configuration extracted by ANY.RUN

In our example, the AsyncRAT execution chain started from a malicious document that dropped a payload. After that, malware added itself to autorun and made a little sleep through timeout. In the end, AsyncRAT ran itself as a child process and tried to connect to C2. Malware configuration was successfully extracted from the sample, so analysts can save a lot of time on manual steps.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

How to detect AsyncRAT using ANY.RUN?

The oldest versions of AsyncRAT were identified by writing the key and name D04F4D4D0DF87BA77AAE in the registry. The newest version of the malicious program sends the stolen info to its panel just right after the start of the execution. The detection will happen after less than a minute. Apart from that, AsyncRAT is caught by YARA rules.

Gathering threat intelligence on AsyncRAT malware

To collect up-to-date intelligence on AsyncRAT, use Threat Intelligence Lookup.

This service gives you access to a vast database filled with insights from millions of malware analysis sessions conducted in the ANY.RUN sandbox.

With over 40 customizable search parameters, including IPs, domains, file names, and process artifacts, you can efficiently gather relevant data on threats like AsyncRAT.

AsyncRAT ANY.RUN Search results for AsyncRAT in Threat Intelligence Lookup

For example, you can search directly for the threat name or use related indicators like hash values or network connections. Submitting a query such as threatName:"asyncrat" AND domainName:"" will generate a list of files, events, domain names, and other data extracted from AsyncRAT samples along with sandbox sessions that you can explore in detail to gain comprehensive insights into this malware’s behavior.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Distribution of AsyncRAT

AsyncRAT uses a couple of distribution methods. It is usually spread with spam email campaigns as malicious attachments or via infected ads on compromised websites. Sometimes the RAT is dropped by other malware, which first infects the system through a VBS script. The Threat Analysis Unit also warned that it can arrive via exploit kits.

Conclusion

It’s difficult to say whether the original release of AsyncRAT was meant to be a harmless remote administration tool. The notes claimed that it was designed for educational purposes. But it could be that the creator simply found a clever way to market malware on a legitimate site.

Regardless of the intent, the code uploaded to GitHub already had enough malicious capabilities to cause monetary losses to organizations. Since then, it has been heavily modified to support countless distribution methods, including fileless delivery, making this RAT highly dangerous.

But researchers can easily identify any of its strains by running an analysis in ANY.RUN sandbox. It takes only 2 minutes on average to launch an emulation, diagnose AsyncRAT and collect indicators of compromise.

Create your free ANY.RUN account to analyze malware and phishing without limits!

HAVE A LOOK AT

zgRAT screenshot
zgRAT
zgrat
zgRAT is a malware known for its ability to infect systems and exfiltrate sensitive data to command-and-control (C2) servers. It is primarily distributed through loader malware, as well as phishing emails. zgRAT employs various advanced techniques, including process injection and code obfuscation, to evade detection and maintain persistence on infected systems. The malware can also spread via USB drives and uses popular messaging platforms like Telegram and Discord for data exfiltration.
Read More
INC Ransomware screenshot
INC Ransomware is a ransomware-as-a-service (RaaS) spotted in mid-2023. It targets industries like retail, real estate, finance, healthcare, and education, primarily in the U.S. and UK. It encrypts and exfiltrates data demanding a ransom. It employs advanced evasion techniques, destroys backup, and abuses legitimate system tools at all the stages of the kill chain.
Read More
LokiBot screenshot
LokiBot
lokibot loader trojan
LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.
Read More
Grandoreiro screenshot
Grandoreiro
grandoreiro
Grandoreiro is a Latin American banking trojan first observed in 2016. It targets mostly Spanish-speaking countries, such as Brazil, Spain, Mexico and Peru. This malware is operated as a Malware-as-a-Service (MaaS), which makes it easily accessible for cybercriminals. Besides, it uses advanced techniques to evade detection.
Read More
Cactus Ransomware screenshot
Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
Read More
Salvador Stealer screenshot
Salvador Stealer
salvador
Salvador Stealer is a powerful, information-stealing Android malware designed to silently infiltrate systems, extract sensitive data, and exfiltrate it to cybercriminals. Often sold on underground forums, it is part of the growing ecosystem of “stealers-as-a-service” (SaaS) tools that target individuals and organizations alike.
Read More