{
	"id": "14e25190-6e16-4deb-b1f0-3f6f1dcfbda8",
	"created_at": "2026-04-06T01:30:43.093573Z",
	"updated_at": "2026-04-10T03:21:28.897104Z",
	"deleted_at": null,
	"sha1_hash": "f72ec7663434d9350d0b9826fe791a959b16539e",
	"title": "AsyncRAT Activity",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 56974,
	"plain_text": "AsyncRAT Activity\r\nBy eSentire Threat Response Unit (TRU)\r\nArchived: 2026-04-06 01:09:20 UTC\r\nAdversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters\r\nand Cyber Analysts who hunt, investigate, contain and respond to threats within minutes.\r\nWe have discovered some of the most dangerous threats and nation state attacks in our space – including the\r\nKaseya MSP breach and the more_eggs malware.\r\nOur Security Operations Centers are supported with Threat Intelligence, Tactical Threat Response and Advanced\r\nThreat Analytics driven by our Threat Response Unit – the TRU team.\r\nIn TRU Positives, eSentire’s Threat Response Unit (TRU) provides a summary of a recent threat investigation. We\r\noutline how we responded to the confirmed threat and what recommendations we have going forward.\r\nHere’s the latest from our TRU Team…\r\nWhat did we find?\r\nHow did we find it?\r\nOur Machine Learning PowerShell classifier detected the attempt to retrieve the second stage PowerShell\r\nscript.\r\nOur 24/7 SOC cyber analysts were alerted and investigated.\r\nWhat did we do?\r\nOur SOC cyber analysts investigated and confirmed that the activity is malicious.\r\nIsolated the host on the customer’s behalf to contain this incident in accordance with the customer’s\r\nbusiness policies.\r\nWhat can you learn from this TRU positive?\r\nAsyncRAT is an open-source project. Successful delivery and infection of AsyncRAT requires layers of\r\nobfuscation and code injection.\r\nWe covered this infection chain previously.\r\nThe infection chain requires the user to follow several steps to grant the adversary code execution\r\ncapabilities. Unfortunately, mounting ISOs or executing scripting files in Windows is trivial and similar\r\ninfection chains are increasingly common.\r\nLayers of embedded files may thwart email filtering. The malicious payload is only retrieved when the user\r\nhas completed several manual steps.\r\nhttps://www.esentire.com/blog/asyncrat-activity\r\nPage 1 of 5\n\nRecommendations from our Threat Response Unit (TRU) Team:\r\nAttacks such as this rely on user execution. Using phishing and security awareness training, increase your\r\nemployees’ awareness of:\r\nEmail-based attacks (e.g., business email compromise (BEC) attacks), particularly those delivering\r\nHTML or ISO files.\r\nUnknown ISO or script files (VBS, JS). These file types pose a risk and shouldn’t be opened.\r\nCreate new “Open With” parameters for script files (.js, .jse, .hta, .vbs) so they open with notepad.exe. This\r\nsetting is found in the Group Policy Management Console under User\r\nConfiguration \u003e Preferences \u003e Control Panel Settings \u003e Folder Options.\r\nBy default, these script files are executed automatically using Windows Script Host (wscript.exe) or\r\nMicrosoft HTML Application host (mshta.exe) when double-clicked by a user.\r\nISO files are mounted as a drive when double-clicked by users by default, consider deregistering this file\r\nextension in Windows File Explorer.\r\nAsk Yourself...\r\n1. Are your users sufficiently aware of techniques bypassing email filtering?\r\n2. What level of visibility do you have across your network, endpoint, and overall environment to detect\r\nmalicious behavior at scale?\r\n3. Can you respond to remote access malware in a timely manner?\r\nTo learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next\r\nLevel MDR, connect with an eSentire Security Specialist now.\r\nhttps://www.esentire.com/blog/asyncrat-activity\r\nPage 2 of 5\n\nGET STARTED\r\nABOUT ESENTIRE’S THREAT RESPONSE UNIT (TRU)\r\nThe eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your\r\norganization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7\r\nSecurity Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and\r\nworks as an extension of your security team to continuously improve our Managed Detection and Response\r\nservice. By providing complete visibility across your attack surface and performing global threat sweeps and\r\nproactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending\r\nyour organization against known and unknown threats.\r\nhttps://www.esentire.com/blog/asyncrat-activity\r\nPage 3 of 5\n\nBack to blog\r\nTake Your Cybersecurity Program to the Next Level with eSentire MDR.\r\nBUILD A QUOTE\r\nin this blog\r\nWhat did we find?How did we find it?What did we do?What can you learn from this TRU positive?\r\nRecommendations from our Threat Response Unit (TRU) Team:\r\nhttps://www.esentire.com/blog/asyncrat-activity\r\nPage 4 of 5\n\nSource: https://www.esentire.com/blog/asyncrat-activity\r\nhttps://www.esentire.com/blog/asyncrat-activity\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.esentire.com/blog/asyncrat-activity"
	],
	"report_names": [
		"asyncrat-activity"
	],
	"threat_actors": [],
	"ts_created_at": 1775439043,
	"ts_updated_at": 1775791288,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f72ec7663434d9350d0b9826fe791a959b16539e.pdf",
		"text": "https://archive.orkl.eu/f72ec7663434d9350d0b9826fe791a959b16539e.txt",
		"img": "https://archive.orkl.eu/f72ec7663434d9350d0b9826fe791a959b16539e.jpg"
	}
}