Skip to main content
Skip to main content
60 entries found. Displaying page 2 of 3.
Updated on Nov 09, 2022

Trojan:Win32/AsyncRat!MSR is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

Alert level: severe
Updated on Apr 16, 2020

Trojan:Win32/AsyncRat.PA!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Apr 11, 2022

Trojan:Win32/AsyncRat.MA!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Jan 10, 2023

Trojan:Win32/AsyncRAT.BH!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Mar 20, 2023

Trojan:Win32/AsyncRAT.ST!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on May 04, 2023

Trojan:Win32/AsyncRAT.SS!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on May 16, 2023

Trojan:Win32/AsyncRAT.SM!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Jun 02, 2023

Trojan:Win32/AsyncRAT.TG!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Jun 20, 2023

Trojan:Win32/Asyncrat!ic is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

Alert level: severe
Updated on Nov 14, 2023

Trojan:Win32/AsyncRAT.DV!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Feb 14, 2024

Trojan:Win32/AsyncRAT.EM!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat.

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on May 20, 2025

Trojan:Win32/AsyncRAT.DB!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat.

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Jan 20, 2026
Alert level: severe
Updated on May 20, 2025

Trojan:Win32/AsyncRat.Z!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Jul 20, 2022

Trojan:Win32/AsyncRAT.SSS!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Feb 28, 2023

Trojan:Win32/AsyncRAT.GFF!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Mar 31, 2023

Trojan:Win32/AsyncRAT.PXJ!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Apr 05, 2023

Trojan:Win32/AsyncRAT.RDH!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance.

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on Apr 13, 2023

Trojan:Win32/AsyncRAT.EAP!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe
Updated on May 10, 2023

Trojan:Win32/AsyncRAT.PRT!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate 32-bit open-source remote management utility. In contrasts with the 64-bit version of the same trojan horse family. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level threat actors and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry to run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command-and-control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and device reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family. 

Alert level: severe