Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1622 | Debugger Evasion |
AsyncRAT can use the |
|
Enterprise | T1568 | Dynamic Resolution | ||
Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
AsyncRAT can hide the execution of scheduled tasks using |
Enterprise | T1105 | Ingress Tool Transfer | ||
Enterprise | T1056 | .001 | Input Capture: Keylogging |
AsyncRAT can capture keystrokes on the victim’s machine.[4] |
Enterprise | T1106 | Native API |
AsyncRAT has the ability to use OS APIs including |
|
Enterprise | T1057 | Process Discovery |
AsyncRAT can examine running processes to determine if a debugger is present.[3] |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
AsyncRAT can create a scheduled task to maintain persistence on system start-up.[3] |
Enterprise | T1113 | Screen Capture |
AsyncRAT has the ability to view the screen on compromised hosts.[4] |
|
Enterprise | T1082 | System Information Discovery |
AsyncRAT can check the disk size through the values obtained with |
|
Enterprise | T1033 | System Owner/User Discovery |
AsyncRAT can check if the current user of a compromised system is an administrator. [3] |
|
Enterprise | T1125 | Video Capture | ||
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.[3] |