AsyncRAT C2 Activity at Internet Scale - Censys By Josue Published: 2026-01-29 · Archived: 2026-04-05 20:04:08 UTC Executive Summary AsyncRAT is an open-source .NET remote access trojan (RAT) implemented in C# and first released publicly in 2019. AsyncRAT has since become widely adopted by criminal operators for persistent remote access, surveillance, and data theft. The malware supports remote command execution, file transfer, keylogging, screen capture, and credential harvesting, typically communicating with command-and-control (C2) servers over a custom TCP protocol with traffic encrypted via SSL/TLS, often using self-signed certificates that may present CN=AsyncRAT Server.  As of January 2026, Censys is tracking 57 active AsyncRAT-associated hosts exposed on the public internet. These hosts are primarily concentrated within a small number of VPS-focused autonomous systems and frequently reuse a distinctive self-signed TLS certificate identifying the service as an “AsyncRAT Server,” enabling scalable discovery of related infrastructure beyond sample-based detection. Operationally, AsyncRAT enables long-lived unauthorized access and post-compromise control, making it a reliable tool for credential theft, lateral movement staging, and follow-on payload delivery. Count of AsyncRAT assets in the Censys Platform Threat Hunt Module Background AsyncRAT was released publicly in 2019 by the developer known as NYAN-x-CAT and distributed via an open GitHub repository. Since its release, the codebase has been widely copied, modified, and redistributed across criminal communities, contributing to its persistent presence in commodity malware ecosystems. The project has not undergone a formal rebrand in the way some families have, but it has spawned multiple closely related forks and derivatives, including DCRat (DarkCrystal RAT) and VenomRAT, which retain overlapping functionality and infrastructure patterns. This fragmentation complicates tracking when analysts rely solely on family names rather than shared technical artifacts. https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 1 of 10 AsyncRAT is most commonly delivered through malspam campaigns using compressed archives or document-based lures, as well as through loader chains that deploy the RAT as a secondary payload after initial execution. In some cases, AsyncRAT appears alongside other commodity tooling, enabling operators to blend its activity into high-volume background noise. Capabilities Once deployed, AsyncRAT provides operators with a broad set of post-compromise capabilities: Remote command execution and interactive shell access Credential theft via keylogging and memory access File upload, download, and arbitrary payload staging Persistence through scheduled tasks, registry run keys, or services Follow-on tooling deployment and lateral movement preparation Technical Characteristics AsyncRAT deployments exhibit several recurring technical traits observable across campaigns: Common filenames and artifacts: Though the AsyncRAT builder defaults to “AsyncClient.exe”, operators frequently use generic or misleading executable names, or masqueraded system binaries; registry-based persistence commonly leverages standard Run key locations.  Network behavior: AsyncRAT typically communicates with C2 servers over a custom TCP protocol, often exposed on non-standard ports such as 8808, 6606, and 7707, rather than embedding traffic within common application protocols  TLS characteristics: Many deployments wrap C2 traffic in SSL/TLS using self-signed certificates, frequently presenting a common name such as “AsyncRAT Server” AsyncRAT Server Client https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 2 of 10 AsyncRAT client builder default connection options AsyncRAT Server About Information https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 3 of 10 AsyncRAT Server Default Network Configuration AsyncRAT Server Certificate Configuration and Default Certificate Name Operational Context AsyncRAT remains relevant due to its low barrier to entry, ease of customization, and continued reuse across a wide range of operators. While often associated with opportunistic campaigns, its infrastructure and tooling have also appeared in more targeted activity, underscoring how commodity RATs continue to serve as building blocks for diverse threat models. Reuse of distinctive TLS artifacts and concentration within a limited set of VPS providers further amplifies its visibility at internet scale. https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 4 of 10 The following section summarizes Censys visibility into infrastructure and prevalence trends associated with AsyncRAT. Censys Perspective Out of the 57 total assets hosting AsyncRAT, we analyzed how they were distributed across infrastructure and found evidence of a decentralized hosting strategy favoring budget VPS providers and resellers. The dominance of APIVERSA (13% of hosts), Contabo networks (11% combined), and AS-COLOCROSSING (5.5%) indicates operators prioritize low-cost, abuse-tolerant hosting over major cloud providers.  Geographic concentration in the US, Netherlands, and Germany aligns with data center density in these regions rather than operator location. https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 5 of 10 The near-universal use of the default “AsyncRAT Server” certificate (98%) suggests operators are deploying unmodified or lightly customized versions of the RAT, creating a highly reliable detection pivot.  Multiple hosts running 3-5 AsyncRAT instances on sequential ports (e.g., 185.196.9.158 with ports 4501-4504) indicate either multi-campaign infrastructure or redundancy configurations. https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 6 of 10 Case Study Another approach to hunting AsyncRAT with Censys Platform is to go after exposed clients.  By searching for the known default name of the AsyncRAT client (AsyncClient.exe) we are able to discover AsyncRAT samples staged in Open Directories using the Censys Open Directory details view.  An AsyncRAT payload (client) hosted in an open directory https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 7 of 10 Configuration using rat-king-parser validating this is an AsyncRAT sample Static analysis confirms the payload is AsyncRAT. The sample implements the canonical AsyncRAT client architecture, including MessagePack-encoded command routing using a top-level Packet field, a plugin-based execution model that dynamically loads compressed assemblies in memory and invokes a standardized Plugin.Plugin.Run() entrypoint, and an AES-encrypted configuration schema containing the standard AsyncRAT fields (Hosts, Ports, MTX, Install, BDOS, Pastebin, Group). The client initializes a self-signed TLS channel using an embedded X.509 certificate whose decrypted subject is “AsyncRAT Server”, and passes that certificate directly into the client socket and plugin runtime.  To disambiguate between AsyncRAT and VenomRAT (which shares much of the original codebase) we searched for VenomRAT-specific modules.  No VenomRAT-specific modules or configuration expansions (e.g., HVNC, clipper, Telegram control) were observed, supporting classification as AsyncRAT rather than a VenomRAT fork. https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 8 of 10 Manual validation of configuration in dnSpy showing the AES256 encrypted strings Manual decryption of ‘Hosts’ value using Powershell to validate rat-king-parser extraction Notable Findings The presence of a Chinese-localized certificate variant (“AsyncRAT 服务器”) and a “bullet-proof” hostname in certificate data indicates geographic expansion of operator demographics beyond the typical Eastern European and Latin American threat actor communities historically associated with AsyncRAT. These infrastructure patterns inform how defenders can prioritize detection and blocking, detailed in the following section. https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 9 of 10 Andrew Northern Principal Security Researcher Andrew Northern is a Principal Security Researcher with Censys ARC focused on tracking the apex predators of the initial-access e-crime landscape. His work targets the most capable operators, uncovering novel attack chains and dynamic web-delivered malware while mapping the infrastructure that enables them. He has earned multiple MITRE ATT&CK citations, discovered and named several espionage-focused malware families, and published research that exposes previously unknown tradecraft. Source: https://censys.com/blog/asyncrat-c2-activity-at-internet-scale https://censys.com/blog/asyncrat-c2-activity-at-internet-scale Page 10 of 10