AsyncRAT

AsyncRAT is an open-source remote access tool originally available through the NYANxCAT Github repository that has been used in malicious campaigns.[1][2][3]

ID: S1087
Type: TOOL
Platforms: Windows
Contributors: Aaron Jornet
Version: 1.0
Created: 20 September 2023
Last Modified: 10 October 2023

Techniques Used

Domain ID Name Use
Enterprise T1059 .003 Command and Scripting Interpreter: Windows Command Shell

AsyncRAT can be deployed via batch script.[4]

Enterprise T1622 Debugger Evasion

AsyncRAT can use the CheckRemoteDebuggerPresent function to detect the presence of a debugger.[3]

Enterprise T1568 Dynamic Resolution

AsyncRAT can be configured to use dynamic DNS.[5]

.002 Domain Generation Algorithms

AsyncRAT use a DGA to generate a C2 domains.[4]

Enterprise T1564 .003 Hide Artifacts: Hidden Window

AsyncRAT can hide the execution of scheduled tasks using ProcessWindowStyle.Hidden.[3]

Enterprise T1105 Ingress Tool Transfer

AsyncRAT has the ability to download files including over SFTP.[5][4]

Enterprise T1056 .001 Input Capture: Keylogging

AsyncRAT can capture keystrokes on the victim’s machine.[5]

Enterprise T1680 Local Storage Discovery

AsyncRAT can check the disk size through the values obtained with DeviceInfo.[3]

Enterprise T1106 Native API

AsyncRAT has the ability to use OS APIs including CheckRemoteDebuggerPresent.[3]

Enterprise T1566 .001 Phishing: Spearphishing Attachment

AsyncRAT has been delivered via malicious email attachments.[6]

Enterprise T1057 Process Discovery

AsyncRAT can examine running processes to determine if a debugger is present.[3]

Enterprise T1090 .003 Proxy: Multi-hop Proxy

AsyncRAT can proxy C2 through a Tor client.[4]

Enterprise T1053 .005 Scheduled Task/Job: Scheduled Task

AsyncRAT can create a scheduled task to maintain persistence on system start-up.[3]

Enterprise T1113 Screen Capture

AsyncRAT has the ability to view the screen on compromised hosts.[5]

Enterprise T1016 System Network Configuration Discovery

AsyncRAT can enumerate the NetBIOS name on targeted machines.[4]

Enterprise T1033 System Owner/User Discovery

AsyncRAT can check if the current user of a compromised system is an administrator. [3]

Enterprise T1124 System Time Discovery

AsyncRAT can check whether the current system hour and day of the week are within operating hours defined it its configuration.[4]

Enterprise T1204 .002 User Execution: Malicious File

AsyncRAT has been executed through victims opening malicious file attachments.[6]

Enterprise T1125 Video Capture

AsyncRAT can record screen content on targeted systems.[5]

Enterprise T1497 .001 Virtualization/Sandbox Evasion: System Checks

AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.[3]

Groups That Use This Software

ID Name References
G1018 TA2541

[7][1][2][3]

G0099 APT-C-36

APT-C-36 has used a customized version of AsyncRAT.[8][9][10][6]

G1054 MirrorFace

[11][4]

Campaigns

ID Name Description
C0060 Operation AkaiRyū

During Operation AkaiRyū, MirrorFace used custom versions of AsyncRAT.[4]

References