AsyncRAT C2 Activity at Internet Scale

AsyncRAT, Research, Threat Intelligence

Executive Summary

AsyncRAT is an open-source .NET remote access trojan (RAT) implemented in C# and first released publicly in 2019. AsyncRAT has since become widely adopted by criminal operators for persistent remote access, surveillance, and data theft. The malware supports remote command execution, file transfer, keylogging, screen capture, and credential harvesting, typically communicating with command-and-control (C2) servers over a custom TCP protocol with traffic encrypted via SSL/TLS, often using self-signed certificates that may present CN=AsyncRAT Server

As of January 2026, Censys is tracking 57 active AsyncRAT-associated hosts exposed on the public internet. These hosts are primarily concentrated within a small number of VPS-focused autonomous systems and frequently reuse a distinctive self-signed TLS certificate identifying the service as an “AsyncRAT Server,” enabling scalable discovery of related infrastructure beyond sample-based detection.

Operationally, AsyncRAT enables long-lived unauthorized access and post-compromise control, making it a reliable tool for credential theft, lateral movement staging, and follow-on payload delivery.

Count of AsyncRAT assets in the Censys Platform Threat Hunt Module
Count of AsyncRAT assets in the Censys Platform Threat Hunt Module

Background

AsyncRAT was released publicly in 2019 by the developer known as NYAN-x-CAT and distributed via an open GitHub repository. Since its release, the codebase has been widely copied, modified, and redistributed across criminal communities, contributing to its persistent presence in commodity malware ecosystems.

The project has not undergone a formal rebrand in the way some families have, but it has spawned multiple closely related forks and derivatives, including DCRat (DarkCrystal RAT) and VenomRAT, which retain overlapping functionality and infrastructure patterns. This fragmentation complicates tracking when analysts rely solely on family names rather than shared technical artifacts.

AsyncRAT is most commonly delivered through malspam campaigns using compressed archives or document-based lures, as well as through loader chains that deploy the RAT as a secondary payload after initial execution. In some cases, AsyncRAT appears alongside other commodity tooling, enabling operators to blend its activity into high-volume background noise.

Capabilities

Once deployed, AsyncRAT provides operators with a broad set of post-compromise capabilities:

  • Remote command execution and interactive shell access
  • Credential theft via keylogging and memory access
  • File upload, download, and arbitrary payload staging
  • Persistence through scheduled tasks, registry run keys, or services
  • Follow-on tooling deployment and lateral movement preparation

Technical Characteristics

AsyncRAT deployments exhibit several recurring technical traits observable across campaigns:

  • Common filenames and artifacts: Though the AsyncRAT builder defaults to “AsyncClient.exe”, operators frequently use generic or misleading executable names, or masqueraded system binaries; registry-based persistence commonly leverages standard Run key locations. 
  • Network behavior: AsyncRAT typically communicates with C2 servers over a custom TCP protocol, often exposed on non-standard ports such as 8808, 6606, and 7707, rather than embedding traffic within common application protocols 
  • TLS characteristics: Many deployments wrap C2 traffic in SSL/TLS using self-signed certificates, frequently presenting a common name such as “AsyncRAT Server”
asyncrat-server-client.png
AsyncRAT Server Client
AsyncRAT client builder default connection options
AsyncRAT client builder default connection options
Screenshot-2026-01-29-at-3.11.05-PM.png
AsyncRAT Server About Information
Screenshot-2026-01-29-at-3.11.41-PM.png
AsyncRAT Server Default Network Configuration
Screenshot-2026-01-29-at-3.20.37-PM.png
AsyncRAT Server Certificate Configuration and Default Certificate Name

Operational Context

AsyncRAT remains relevant due to its low barrier to entry, ease of customization, and continued reuse across a wide range of operators. While often associated with opportunistic campaigns, its infrastructure and tooling have also appeared in more targeted activity, underscoring how commodity RATs continue to serve as building blocks for diverse threat models. Reuse of distinctive TLS artifacts and concentration within a limited set of VPS providers further amplifies its visibility at internet scale.

The following section summarizes Censys visibility into infrastructure and prevalence trends associated with AsyncRAT.

Censys Perspective

Out of the 57 total assets hosting AsyncRAT, we analyzed how they were distributed across infrastructure and found evidence of a decentralized hosting strategy favoring budget VPS providers and resellers. The dominance of APIVERSA (13% of hosts), Contabo networks (11% combined), and AS-COLOCROSSING (5.5%) indicates operators prioritize low-cost, abuse-tolerant hosting over major cloud providers. 

Screenshot-2026-01-29-at-3.21.49-PM.png

Geographic concentration in the US, Netherlands, and Germany aligns with data center density in these regions rather than operator location.

Screenshot-2026-01-29-at-3.22.30-PM.png

The near-universal use of the default “AsyncRAT Server” certificate (98%) suggests operators are deploying unmodified or lightly customized versions of the RAT, creating a highly reliable detection pivot. 

Screenshot-2026-01-29-at-3.22.53-PM.png

Multiple hosts running 3-5 AsyncRAT instances on sequential ports (e.g., 185.196.9.158 with ports 4501-4504) indicate either multi-campaign infrastructure or redundancy configurations.

Screenshot-2026-01-29-at-3.23.30-PM.png

Case Study

Another approach to hunting AsyncRAT with Censys Platform is to go after exposed clients.  By searching for the known default name of the AsyncRAT client (AsyncClient.exe) we are able to discover AsyncRAT samples staged in Open Directories using the Censys Open Directory details view. 

Screenshot-2026-01-29-at-3.24.12-PM.png
An AsyncRAT payload (client) hosted in an open directory
Screenshot-2026-01-29-at-3.25.03-PM.png
Configuration using rat-king-parser validating this is an AsyncRAT sample

Static analysis confirms the payload is AsyncRAT. The sample implements the canonical AsyncRAT client architecture, including MessagePack-encoded command routing using a top-level Packet field, a plugin-based execution model that dynamically loads compressed assemblies in memory and invokes a standardized Plugin.Plugin.Run() entrypoint, and an AES-encrypted configuration schema containing the standard AsyncRAT fields (Hosts, Ports, MTX, Install, BDOS, Pastebin, Group). The client initializes a self-signed TLS channel using an embedded X.509 certificate whose decrypted subject is “AsyncRAT Server”, and passes that certificate directly into the client socket and plugin runtime. 

To disambiguate between AsyncRAT and VenomRAT (which shares much of the original codebase) we searched for VenomRAT-specific modules.  No VenomRAT-specific modules or configuration expansions (e.g., HVNC, clipper, Telegram control) were observed, supporting classification as AsyncRAT rather than a VenomRAT fork.

Screenshot-2026-01-29-at-3.25.50-PM.png
Manual validation of configuration in dnSpy showing the AES256 encrypted strings
Screenshot-2026-01-29-at-3.31.29-PM.png
Manual decryption of ‘Hosts’ value using Powershell to validate rat-king-parser extraction

Notable Findings

The presence of a Chinese-localized certificate variant (“AsyncRAT 服务器”) and a “bullet-proof” hostname in certificate data indicates geographic expansion of operator demographics beyond the typical Eastern European and Latin American threat actor communities historically associated with AsyncRAT.

Screenshot-2026-01-29-at-3.32.40-PM.png

These infrastructure patterns inform how defenders can prioritize detection and blocking, detailed in the following section.

Conclusion (Implications for Defense)

AsyncRAT’s credential theft capabilities (keylogging, browser password recovery, clipboard hijacking) combined with its persistent access mechanisms (scheduled tasks, registry persistence) make it a high-value threat for network-based detection and credential hygiene efforts.

Detection Strategies

Host-Based Detection:

  • Unexpected scheduled task creation referencing %APPDATA% or %TEMP% paths
  • Registry Run key additions with obfuscated executable names
  • Windows administrative services (RDP, WinRM, SMB) exposed on internet-facing hosts
  • Process execution from unusual paths mimicking legitimate Windows processes
  • PowerShell or .NET execution with AMSI bypass indicators

Network-Based Detection:

Blocking Recommendations:

  • Leverage the Censys Threat Hunting Platform to identify and disrupt infrastructure linked to AsyncRAT. Run the provided queries regularly and alert on any outbound communications matching these patterns.
A man with long blonde hair, a mustache and goatee, wearing a dark suit and black shirt, against a blue background.
AUTHOR
Andrew Northern
Principal Security Researcher

Andrew Northern is a Principal Security Researcher at Censys focused on tracking the apex predators of the initial-access ecrime landscape. His work targets the most capable operators, uncovering novel attack chains and dynamic web-delivered malware while mapping the infrastructure that enables them. He has earned multiple MITRE ATT&CK citations, discovered and named several espionage-focused malware families, and published research that exposes previously unknown tradecraft.