techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#AsyncRAT

0 posts0 participants0 posts today

Unmasking AsyncRAT: Navigating the labyrinth of forks

AsyncRAT, an open-source remote access trojan, has spawned numerous forks since its 2019 release, becoming a cornerstone of modern malware. This analysis maps out the relationships among AsyncRAT variants, focusing on prominent forks like DcRat and VenomRAT, as well as lesser-known versions. The research explores the evolution of these forks, their unique features, and the methods used to identify them. It also delves into exotic variants with specialized plugins, such as NonEuclid RAT's jump scare and malware spreader functionalities. The proliferation of AsyncRAT forks highlights the risks associated with open-source malware frameworks and the need for proactive detection strategies.

Pulse ID: 687758ff039275831fbcb386
Pulse Link: otx.alienvault.com/pulse/68775
Pulse Author: AlienVault
Created: 2025-07-16 07:47:10

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

New AsyncRAT Variants Use Screamer Tool and USB Malware Spreader

Cybersecurity researchers have discovered two variants of AsyncRAT, that extend its capabilities by adding psychological warfare and enhanced propagation features.

Pulse ID: 6876e73a98de0aff01a723b2
Pulse Link: otx.alienvault.com/pulse/6876e
Pulse Author: cryptocti
Created: 2025-07-15 23:41:46

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

#ESETresearch has mapped the labyrinth of #AsyncRAT forks, identifying the most prevalent versions of this open-source malware. While some variants are mere curiosities, others pose a more tenacious threat. welivesecurity.com/en/eset-res
AsyncRAT comes with the typical RAT functionalities, including keylogging, screen capturing, and credential theft. Other threat actors have developed a multitude of variants based on its source code.
Our analysis revealed the most widely used and deployed forks of AsyncRAT, with the most prevalent among them being #DcRat.
Although DcRat holds a smaller share compared to AsyncRAT, it offers notable improvements. These include advanced evasion techniques, and the use of an open-source library for more efficient binary data serialization.
AsyncRAT forks often include prank-style plugins, such as for opening and closing the CD tray and turning off the monitor. Spoof versions dubbed SantaRAT and BoratRAT have also emerged – mostly intended as jokes.
AsyncRAT and its variants demonstrate how quickly and creatively threat actors can adapt open-source code – especially with the assistance of #LLMs. This underscores the importance of proactive detection and effective analysis of emerging threats.
IoCs available on our GitHub: github.com/eset/malware-ioc/tr