Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Oct 20, 2021 | Updated Nov 23, 2025

Trojan:VBS/AsyncRAT

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Trojan:VBS/AsyncRAT represents a specialized loader for the AsyncRAT remote administration tool, which threat actors weaponize for complete device compromise. This trojan family infiltrates devices through social engineering tactics, where users are tricked into running malicious VBScript files disguised as legitimate documents or bundled within archive files. The script's fundamental purpose is to establish a foothold on the target machine, after which it orchestrates the retrieval, decoding, and launching of the full AsyncRAT payload. This payload establishes a persistent backdoor, enabling threat actors to conduct extensive surveillance operations, exfiltrate sensitive data, and maintain long-term remote control over the compromised environment, often while evading conventional security measures through advanced obfuscation and injection techniques. 

  • Disconnect the infected device from all networks (both wired and wireless) to sever the command-and-control connection. 
  • Check the Windows Task Scheduler or Process Explorer for malicious tasks like "Reklam" and delete them. 
  • Review and delete any suspicious scheduled tasks created by the malware. 
  • Manually inspect and remove the malicious registry entry from HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. 
  • Check the Windows Startup folder and remove any malicious VBS files (e.g., Startup.vbs). 
  •  Conduct a thorough manual search of the file system to locate and delete all dropped files. Key locations to clean include: 
  1. %Temp% and %UserProfile%\AppData\Local\Temp 
  2. C:\Users\Public\ 
  3. C:\ProgramData\ 

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us