{"id":175774,"date":"2023-11-03T05:53:18","date_gmt":"2023-11-03T12:53:18","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=175774"},"modified":"2023-11-03T05:53:18","modified_gmt":"2023-11-03T12:53:18","slug":"unmasking-asyncrat-new-infection-chain","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/","title":{"rendered":"Unmasking AsyncRAT New Infection Chain"},"content":{"rendered":"<p><em>Authored by <span class=\"NormalTextRun SCXW247989531 BCX0\" data-ccp-parastyle=\"Subtitle\">Lakshya Mathur<\/span><span class=\"NormalTextRun SCXW247989531 BCX0\" data-ccp-parastyle=\"Subtitle\"> &amp; Vignesh<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW247989531 BCX0\" data-ccp-parastyle=\"Subtitle\">Dhatchanamoorthy<\/span><\/em><\/p>\n<p>AsyncRAT, short for &#8220;Asynchronous Remote Access Trojan,&#8221; is a sophisticated piece of malware designed to compromise the security of computer systems and steal sensitive information. What sets AsyncRAT apart from other malware strains is its stealthy nature, making it a formidable adversary in the world of cybersecurity.<em><br \/>\n<\/em><\/p>\n<p>McAfee Labs has observed a recent AsyncRAT campaign being distributed through a malicious HTML file. This entire infection strategy employs a range of file types, including PowerShell, Windows Script File (WSF), VBScript (VBS), and more, in order to bypass antivirus detection measures.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-175961 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure1.png\" alt=\"\" width=\"810\" height=\"498\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure1.png 810w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure1-300x184.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure1-768x472.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure1-205x126.png 205w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/p>\n<p><em>Figure 1 \u2013 AsyncRAT prevalence for the last one month<\/em><\/p>\n<h2><strong>Technical Analysis<\/strong><\/h2>\n<p>A recipient receives a spam email containing a nefarious web link. When accessed, this link triggers the download of an HTML file. Within this HTML file, an ISO file is embedded, and this ISO image file harbors a WSF (Windows Script File). The WSF file subsequently establishes connections with various URLs and proceeds to execute multiple files in formats such as PowerShell, VBS (VBScript), and BAT. These executed files are employed to carry out a process injection into RegSvcs.exe, a legitimate Microsoft .NET utility. This manipulation of RegSvcs.exe allows the attacker to covertly hide their activities within a trusted system application.<\/p>\n<p><strong>Infection Chain<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-175975 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure2.png\" alt=\"\" width=\"1540\" height=\"1050\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure2.png 1540w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure2-300x205.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure2-1024x698.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure2-768x524.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure2-1536x1047.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure2-189x129.png 189w\" sizes=\"auto, (max-width: 1540px) 100vw, 1540px\" \/><br \/>\n<\/strong><\/p>\n<p><em>Figure 2 \u2013 Infection Chain<\/em><\/p>\n<p><strong>Stage 1: Analysis of HTML &amp; WSF file<\/strong><\/p>\n<p>The sequence begins with a malicious URL found within the email, which initiates the download of an HTML file. Inside this HTML file, an ISO file is embedded. Further JavaScript is utilized to extract the ISO image file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-175989\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure3-300x65.png\" alt=\"\" width=\"300\" height=\"65\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure3-300x65.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure3-205x44.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure3.png 696w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><em>Figure 3 \u2013 Contents of HTML file<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176003 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure4.png\" alt=\"\" width=\"471\" height=\"283\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure4.png 471w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure4-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure4-205x123.png 205w\" sizes=\"auto, (max-width: 471px) 100vw, 471px\" \/><\/p>\n<p><em>Figure 4 \u2013 Extracted ISO file when HTML is run<\/em><\/p>\n<p>Within the ISO file is a WSF script labeled as &#8220;FXM_20231606_9854298542_098.wsf.&#8221; This file incorporates junk strings of data, interspersed with specific &#8220;&lt;job&gt;&#8221; and &#8220;&lt;VBScript&gt;&#8221; tags (as indicated in Figure 5 and highlighted in red). These tags are responsible for establishing a connection to the URL &#8220;hxxp:\/\/45.12.253.107:222\/f[.]txt&#8221; to fetch a PowerShell file.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176017 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure5.png\" alt=\"\" width=\"1677\" height=\"458\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure5.png 1677w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure5-300x82.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure5-1024x280.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure5-768x210.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure5-1536x419.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure5-205x56.png 205w\" sizes=\"auto, (max-width: 1677px) 100vw, 1677px\" \/><\/p>\n<p><em>Figure 5 \u2013 Contents of WSF file<\/em><\/p>\n<p><strong>Stage 2: Analysis of PowerShell files<\/strong><\/p>\n<p>The URL &#8220;hxxp:\/\/45.12.253.107:222\/f[.]txt&#8221; retrieves a text file that contains PowerShell code.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176031 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure6.png\" alt=\"\" width=\"557\" height=\"146\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure6.png 557w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure6-300x79.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure6-205x54.png 205w\" sizes=\"auto, (max-width: 557px) 100vw, 557px\" \/><\/p>\n<p><em>Figure 6 \u2013 Contents of the First PowerShell file<\/em><\/p>\n<p>The initial PowerShell code subsequently establishes a connection to another URL, &#8220;hxxp:\/\/45.12.253.107:222\/j[.]jpg,&#8221; and retrieves the second PowerShell file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176045 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure7.png\" alt=\"\" width=\"1049\" height=\"458\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure7.png 1049w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure7-300x131.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure7-1024x447.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure7-768x335.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure7-205x90.png 205w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/p>\n<p><em>Figure 7 \u2013 Contents of Second PowerShell file<\/em><\/p>\n<p>The PowerShell script drops four files into the ProgramData folder, including two PowerShell files, one VBS file, and one BAT file. The contents of these four files are embedded within this PowerShell script. It then proceeds to create a folder named &#8220;xral&#8221; in the ProgramData directory, where it writes and extracts these files, as depicted in Figure 8.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176059 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure8.png\" alt=\"\" width=\"1088\" height=\"516\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure8.png 1088w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure8-300x142.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure8-1024x486.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure8-768x364.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure8-205x97.png 205w\" sizes=\"auto, (max-width: 1088px) 100vw, 1088px\" \/><\/p>\n<p><em>Figure 8 \u2013 Second PowerShell creating 4 files and writing content in them using [IO.File]::WriteAllText command<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176073 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure9.png\" alt=\"\" width=\"532\" height=\"161\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure9.png 532w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure9-300x91.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure9-205x62.png 205w\" sizes=\"auto, (max-width: 532px) 100vw, 532px\" \/><\/p>\n<p><em>Figure 9 \u2013 Files extracted in the \u201cProgramData\/xral\u201d folder<\/em><\/p>\n<p><strong>Stage 3: Analysis of Files dropped in the ProgramData folder<\/strong><\/p>\n<p>Following this, the PowerShell script executes &#8220;xral.ps1,&#8221; which is responsible for establishing a scheduled task to achieve persistence. Additionally, it initiates the execution of the &#8221; xral.vbs &#8221; file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176087 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure10.png\" alt=\"\" width=\"454\" height=\"114\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure10.png 454w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure10-300x75.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure10-205x51.png 205w\" sizes=\"auto, (max-width: 454px) 100vw, 454px\" \/><\/p>\n<p><em>Figure 10 \u2013 Content of VBS file<\/em><\/p>\n<p>The VBS script proceeds to execute the &#8220;1.bat&#8221; file, which, in turn, is responsible for executing the final PowerShell script, &#8220;hrlm.ps1.&#8221;<\/p>\n<p>In a nutshell, after the second powershell, the execution goes like:<\/p>\n<p>xral.ps1 \u00a0-&gt;\u00a0 xral.vbs\u00a0 -&gt;\u00a0 1.bat\u00a0 -&gt;\u00a0 hrlm.ps1<\/p>\n<p>These various executions of different file types are strategically employed to circumvent both static and behavior-based antivirus detections.<\/p>\n<p><strong>Stage 4: Analysis of the final PowerShell file<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176101 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure11.png\" alt=\"\" width=\"1848\" height=\"593\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure11.png 1848w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure11-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure11-1024x329.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure11-768x246.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure11-1536x493.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure11-205x66.png 205w\" sizes=\"auto, (max-width: 1848px) 100vw, 1848px\" \/><\/p>\n<p><em>Figure 11 \u2013 Content of final PowerShell file<\/em><\/p>\n<p>As depicted in the preceding figure, this PowerShell file contains a PE (Portable Executable) file in hexadecimal format. This file is intended for injection into a legitimate process. In the second red-highlighted box, it&#8217;s evident that the attackers have obfuscated the process name, which will be revealed after performing a replacement operation. It is now evident that this PE file is intended for injection into &#8220;C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe.&#8221; The process injection is accomplished through the Reflection Assembly load functionality of the PowerShell file, which allows access and invocation of .NET data from within PowerShell.<\/p>\n<p>After the process injection, the RegSvcs utility is initiated and executed without any additional parameters.<\/p>\n<p><strong>Stage 5: Analysis of infected RegSvcs.exe<\/strong><\/p>\n<p>Once PowerShell successfully injects malicious code into RegSvcs, the compromised RegSvcs.exe runs, and the AsyncRAT server establishes a connection to it. The artifacts of this infected RegSvcs.exe running are illustrated in Figure 12.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176115 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure12.png\" alt=\"\" width=\"602\" height=\"643\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure12.png 602w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure12-281x300.png 281w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure12-121x129.png 121w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/p>\n<p>Figure 12 \u2013 AsyncRAT server strings in RegSvcs<\/p>\n<p>Further analysis uncovered that this sample possesses keylogging capabilities. It recorded all activities performed on the system after replication, storing this information in a &#8220;log.tmp&#8221; file within the TEMP folder for record-keeping purposes.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176129 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure13.png\" alt=\"\" width=\"1913\" height=\"323\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure13.png 1913w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure13-300x51.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure13-1024x173.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure13-768x130.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure13-1536x259.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure13-205x35.png 205w\" sizes=\"auto, (max-width: 1913px) 100vw, 1913px\" \/><\/p>\n<p>Figure 13 \u2013 Log file created in %temp% folder logging all keystrokes<\/p>\n<p>Furthermore, this sample was actively engaged in the theft of credentials and browser-related data. Additionally, it attempted to search for cryptocurrency-related information, including data related to Bitcoin, Ethereum, and similar assets. The illicitly acquired data was being transmitted over TCP to the IP address 45[.]12.253.107 on port 8808.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-176143 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure14.png\" alt=\"\" width=\"606\" height=\"60\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure14.png 606w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure14-300x30.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/Figure14-205x20.png 205w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>Figure 14 \u2013 TCP information of RegSvcs.exe<\/p>\n<h2><strong>Summary<\/strong><\/h2>\n<p>The infection chain begins with a malicious URL embedded in a spam email, leading to the download of an HTML file containing an ISO. Within the ISO file, a WSF script connects to external URLs and downloads a PowerShell script, which, in turn, initiates a series of non-PE file executions and ultimately injects a hexadecimal-encoded PE file into the legitimate &#8220;RegSvcs.exe.&#8221; This compromised process connects to an AsyncRAT server. The malware exhibits keylogging capabilities, records user activities, and steals credentials, browser data, and crypto-related information. Data is exfiltrated over TCP to an IP address and port. This intricate chain leverages diverse file types and obfuscation methods to avoid detection, ultimately resulting in the attackers gaining remote control and successfully stealing data.<\/p>\n<h2><strong>Indicator of Compromise (IOCs)<\/strong><\/h2>\n<table width=\"588\">\n<tbody>\n<tr>\n<td width=\"93\"><strong>File<\/strong><\/td>\n<td width=\"495\"><strong>SHA256\/URL<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"93\">HTML<\/td>\n<td width=\"495\">83c96c9853245a32042e45995ffa41393eeb9891e80ebcfb09de8fae8b5055a3<\/td>\n<\/tr>\n<tr>\n<td width=\"93\">ISO<\/td>\n<td width=\"495\">97f91122e541b38492ca2a7c781bb9f6b0a2e98e5b048ec291d98c273a6c3d62<\/td>\n<\/tr>\n<tr>\n<td width=\"93\">WSF<\/td>\n<td width=\"495\">ac6c6e196c9245cefbed223a3b02d16dd806523bba4e74ab1bcf55813cc5702a<\/td>\n<\/tr>\n<tr>\n<td width=\"93\">PS1<\/td>\n<td width=\"495\">0159bd243221ef7c5f392bb43643a5f73660c03dc2f74e8ba50e4aaed6c6f531<\/td>\n<\/tr>\n<tr>\n<td width=\"93\">PS1<\/td>\n<td width=\"495\">f123c1df7d17d51115950734309644e05f3a74a5565c822f17c1ca22d62c3d99<\/td>\n<\/tr>\n<tr>\n<td width=\"93\">PS1<\/td>\n<td width=\"495\">19402c43b620b96c53b03b5bcfeaa0e645f0eff0bc6e9d1c78747fafbbaf1807<\/td>\n<\/tr>\n<tr>\n<td width=\"93\">VBS<\/td>\n<td width=\"495\">34cb840b44befdd236610f103ec1d0f914528f1f256d9ab375ad43ee2887d8ce<\/td>\n<\/tr>\n<tr>\n<td width=\"93\">BAT<\/td>\n<td width=\"495\">1c3d5dea254506c5f7c714c0b05f6e2241a25373225a6a77929e4607eb934d08<\/td>\n<\/tr>\n<tr>\n<td width=\"93\">PS1<\/td>\n<td width=\"495\">83b29151a192f868362c0ecffe5c5fabe280c8baac335c79e8950fdd439e69ac<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"93\">URL<\/td>\n<td width=\"495\">hxxp:\/\/45.12.253[.]107:222\/f[.]txt<\/td>\n<\/tr>\n<tr>\n<td width=\"495\">hxxp:\/\/45.12.253[.]107:222\/j[.]jpg<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Lakshya Mathur &amp; Vignesh Dhatchanamoorthy AsyncRAT, short for &#8220;Asynchronous Remote Access Trojan,&#8221; is a sophisticated piece of malware&#8230;<\/p>\n","protected":false},"author":695,"featured_media":176164,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-175774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unmasking AsyncRAT New Infection Chain | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Lakshya Mathur &amp; Vignesh Dhatchanamoorthy AsyncRAT, short for &quot;Asynchronous Remote Access Trojan,&quot; is a sophisticated piece of malware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unmasking AsyncRAT New Infection Chain | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Lakshya Mathur &amp; Vignesh Dhatchanamoorthy AsyncRAT, short for &quot;Asynchronous Remote Access Trojan,&quot; is a sophisticated piece of malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-03T12:53:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Unmasking AsyncRAT New Infection Chain\",\"datePublished\":\"2023-11-03T12:53:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/\"},\"wordCount\":1131,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/\",\"name\":\"Unmasking AsyncRAT New Infection Chain | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png\",\"datePublished\":\"2023-11-03T12:53:18+00:00\",\"description\":\"Authored by Lakshya Mathur &amp; Vignesh Dhatchanamoorthy AsyncRAT, short for \\\"Asynchronous Remote Access Trojan,\\\" is a sophisticated piece of malware\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Unmasking AsyncRAT New Infection Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unmasking AsyncRAT New Infection Chain | McAfee Blog","description":"Authored by Lakshya Mathur &amp; Vignesh Dhatchanamoorthy AsyncRAT, short for \"Asynchronous Remote Access Trojan,\" is a sophisticated piece of malware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Unmasking AsyncRAT New Infection Chain | McAfee Blog","og_description":"Authored by Lakshya Mathur &amp; Vignesh Dhatchanamoorthy AsyncRAT, short for \"Asynchronous Remote Access Trojan,\" is a sophisticated piece of malware","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-11-03T12:53:18+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Unmasking AsyncRAT New Infection Chain","datePublished":"2023-11-03T12:53:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/"},"wordCount":1131,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/","name":"Unmasking AsyncRAT New Infection Chain | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png","datePublished":"2023-11-03T12:53:18+00:00","description":"Authored by Lakshya Mathur &amp; Vignesh Dhatchanamoorthy AsyncRAT, short for \"Asynchronous Remote Access Trojan,\" is a sophisticated piece of malware","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_AsyncRAT-1.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/unmasking-asyncrat-new-infection-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Unmasking AsyncRAT New Infection Chain"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/175774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=175774"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/175774\/revisions"}],"predecessor-version":[{"id":176192,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/175774\/revisions\/176192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/176164"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=175774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=175774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=175774"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=175774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}