| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
| Enterprise | T1622 | Debugger Evasion |
AsyncRAT can use the |
|
| Enterprise | T1568 | Dynamic Resolution | ||
| .002 | Domain Generation Algorithms | |||
| Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
AsyncRAT can hide the execution of scheduled tasks using |
| Enterprise | T1105 | Ingress Tool Transfer |
AsyncRAT has the ability to download files including over SFTP.[5][4] |
|
| Enterprise | T1056 | .001 | Input Capture: Keylogging | |
| Enterprise | T1680 | Local Storage Discovery |
AsyncRAT can check the disk size through the values obtained with |
|
| Enterprise | T1106 | Native API |
AsyncRAT has the ability to use OS APIs including |
|
| Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
AsyncRAT has been delivered via malicious email attachments.[6] |
| Enterprise | T1057 | Process Discovery |
AsyncRAT can examine running processes to determine if a debugger is present.[3] |
|
| Enterprise | T1090 | .003 | Proxy: Multi-hop Proxy | |
| Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
AsyncRAT can create a scheduled task to maintain persistence on system start-up.[3] |
| Enterprise | T1113 | Screen Capture |
AsyncRAT has the ability to view the screen on compromised hosts.[5] |
|
| Enterprise | T1016 | System Network Configuration Discovery |
AsyncRAT can enumerate the NetBIOS name on targeted machines.[4] |
|
| Enterprise | T1033 | System Owner/User Discovery |
AsyncRAT can check if the current user of a compromised system is an administrator. [3] |
|
| Enterprise | T1124 | System Time Discovery |
AsyncRAT can check whether the current system hour and day of the week are within operating hours defined it its configuration.[4] |
|
| Enterprise | T1204 | .002 | User Execution: Malicious File |
AsyncRAT has been executed through victims opening malicious file attachments.[6] |
| Enterprise | T1125 | Video Capture | ||
| Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.[3] |
| ID | Name | References |
|---|---|---|
| G1018 | TA2541 | |
| G0099 | APT-C-36 |
APT-C-36 has used a customized version of AsyncRAT.[8][9][10][6] |
| G1054 | MirrorFace |
| ID | Name | Description |
|---|---|---|
| C0060 | Operation AkaiRyū |
During Operation AkaiRyū, MirrorFace used custom versions of AsyncRAT.[4] |