Skip to main content
Skip to main content
41 entries found. Displaying page 1 of 3.
Updated on Mar 27, 2025

Trojan:Win64/AsyncRat is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

Alert level: severe
Updated on May 11, 2024

Trojan:Win64/AsyncRat.RPY is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat.  

Alert level: severe
Updated on Dec 12, 2022

Trojan:Win64/AsyncRAT!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRat family.

Alert level: severe
Updated on Oct 04, 2023

Trojan:Win64/AsyncRAT!MSR is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

Alert level: severe
Updated on May 20, 2025

Trojan:Win64/AsyncRat.BT!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.  

Alert level: severe
Updated on May 20, 2025

Trojan:Win64/AsyncRat.BU!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.    

Alert level: severe
Updated on Feb 14, 2024

Trojan:Win64/AsyncRat.RPX!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.      

Alert level: severe
Updated on Feb 14, 2024

Trojan:Win64/AsyncRat.RPY!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.      

Alert level: severe
Updated on May 20, 2025

Trojan:Win64/AsyncRat.RPY!sms is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

Alert level: severe
Updated on May 20, 2025

Trojan:Win64/AsyncRat.SLJ!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.    

Alert level: severe
Updated on Jul 04, 2025

Trojan:Win64/AsyncRat.GRR!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.  

Alert level: severe
Updated on Nov 20, 2025
Alert level: severe
Updated on Aug 06, 2025

Trojan:Win64/Asyncrat.LM!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.  

Alert level: severe
Updated on Dec 08, 2025
Alert level: severe
Updated on Jul 21, 2023

Trojan:Win64/AsyncRAT.A!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family. 

Alert level: severe
Updated on Sep 13, 2023

Trojan:Win64/AsyncRAT.C!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.     

Alert level: severe
Updated on Sep 13, 2023

Trojan:Win64/AsyncRAT.B!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.   

Alert level: severe
Updated on Jul 24, 2025

Trojan:Win64/AsyncRAT.D!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.     

Alert level: severe
Updated on Feb 26, 2024

Trojan:Win64/AsyncRat.CCHU!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.       

Alert level: severe
Updated on May 20, 2025

Trojan:Win64/AsyncRat.CCJX!MTB is a standout as a versatile remote access trojan that first appeared on GitHub in 2019, positioned as a legitimate open-source remote management utility. However, records confirm that following its launch, it has been co-opted for illicit operations by threat actors, including entry-level cybercriminals and organized syndicates tied to ransomware efforts. It is built on the .NET framework, which provides threat actors with full control over a compromised device.  

The infection chain commonly starts with phishing campaigns that deliver malicious scripts or ISO images, leading to the deployment of the payload. To maintain persistence, the malware creates scheduled tasks or registry run keys, and it employs advanced anti-analysis techniques to evade detection, including virtual machine checks, debugger detection, and patching security features. Communication with command and control (C2) servers occurs over custom TCP ports, using efficient serialization for data exfiltration and system reconnaissance. 

Its core functionality encompasses comprehensive surveillance and system manipulation, including keylogging, audio/video recording, file theft, and remote shell access. It can deactivate security software and propagate through networks. Detection relies on behavioral monitoring for anomalies such as unusual process injections, particularly into .NET processes like RegSvcs.exe, and network connections to suspicious domains or IP addresses. Its versatility and ongoing development from an open-source codebase make it a persistent and adaptable threat. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the AsyncRAT family.     

Alert level: severe