AsyncRAT

AsyncRAT is an open-source remote access tool originally available through the NYANxCAT Github repository that has been used in malicious campaigns.[1][2][3]

ID: S1087
Type: TOOL
Platforms: Windows
Contributors: Aaron Jornet
Version: 1.0
Created: 20 September 2023
Last Modified: 10 October 2023

Techniques Used

Domain ID Name Use
Enterprise T1568 动态解析

AsyncRAT can be configured to use dynamic DNS.[4]

Enterprise T1113 屏幕捕获

AsyncRAT has the ability to view the screen on compromised hosts.[4]

Enterprise T1106 本机API

AsyncRAT has the ability to use OS APIs including CheckRemoteDebuggerPresent.[3]

Enterprise T1082 系统信息发现

AsyncRAT can check the disk size through the values obtained with DeviceInfo.[3]

Enterprise T1033 系统所有者/用户发现

AsyncRAT can check if the current user of a compromised system is an administrator. [3]

Enterprise T1497 .001 虚拟化/沙盒规避: System Checks

AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.[3]

Enterprise T1125 视频捕获

AsyncRAT can record screen content on targeted systems.[4]

Enterprise T1622 调试器规避

AsyncRAT can use the CheckRemoteDebuggerPresent function to detect the presence of a debugger.[3]

Enterprise T1105 输入工具传输

AsyncRAT has the ability to download files over SFTP.[4]

Enterprise T1056 .001 输入捕获: Keylogging

AsyncRAT can capture keystrokes on the victim’s machine.[4]

Enterprise T1057 进程发现

AsyncRAT can examine running processes to determine if a debugger is present.[3]

Enterprise T1564 .003 隐藏伪装: Hidden Window

AsyncRAT can hide the execution of scheduled tasks using ProcessWindowStyle.Hidden.[3]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

AsyncRAT can create a scheduled task to maintain persistence on system start-up.[3]

Groups That Use This Software

ID Name References
G1018 TA2541

[5][1][2][3]

References