{"id":191243,"date":"2024-05-08T11:14:14","date_gmt":"2024-05-08T18:14:14","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=191243"},"modified":"2024-05-08T11:21:14","modified_gmt":"2024-05-08T18:21:14","slug":"from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/","title":{"rendered":"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats"},"content":{"rendered":"<p><em>Authored by <span class=\"TextRun Highlight SCXW27323176 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW27323176 BCX0\" data-ccp-charstyle=\"normaltextrun\" data-ccp-charstyle-defn=\"{&quot;ObjectId&quot;:&quot;5bd2d957-82d5-41cd-8d33-6874d49bb478|213&quot;,&quot;ClassId&quot;:1073872969,&quot;Properties&quot;:[201342446,&quot;1&quot;,201342447,&quot;5&quot;,201342448,&quot;3&quot;,201342449,&quot;1&quot;,469777841,&quot;Aptos&quot;,469777842,&quot;Mangal&quot;,469777843,&quot;\uff2d\uff33 \u660e\u671d&quot;,469777844,&quot;Aptos&quot;,201341986,&quot;1&quot;,469769226,&quot;Aptos,Mangal,\uff2d\uff33 \u660e\u671d&quot;,268442635,&quot;24&quot;,335559704,&quot;1025&quot;,335559705,&quot;1041&quot;,335551547,&quot;1033&quot;,335559740,&quot;279&quot;,201341983,&quot;0&quot;,335559739,&quot;160&quot;,469775450,&quot;normaltextrun&quot;,201340122,&quot;1&quot;,134233614,&quot;true&quot;,469778129,&quot;normaltextrun&quot;,335572020,&quot;1&quot;,469778324,&quot;Default Paragraph Font&quot;]}\">Yashvi Shah and Preksha Saxena<\/span><\/span><\/em><\/p>\n<p>AsyncRAT, also known as &#8220;Asynchronous Remote Access Trojan,&#8221; represents a highly sophisticated malware variant meticulously crafted to breach computer systems security and steal confidential data. McAfee Labs has recently uncovered a novel infection chain, shedding light on its potent lethality and the various security bypass mechanisms it employs.<\/p>\n<p>It utilizes a variety of file types, such as PowerShell, Windows Script File (WSF), VBScript (VBS), and others within a malicious HTML file. This multifaceted approach aims to circumvent antivirus detection methods and facilitate the distribution of infection.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191244 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture1.png\" alt=\"\" width=\"649\" height=\"487\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture1.png 649w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture1-300x225.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture1-172x129.png 172w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 1: AsyncRAT prevalence for the last one month<\/em><\/p>\n<h2><strong>Infection Chain:<\/strong><\/h2>\n<p>The infection initiates through a spam email containing an HTML page attachment. Upon unwittingly opening the HTML page, an automatic download of a Windows Script File (WSF) ensues. This WSF file is deliberately named in a manner suggestive of an Order ID, fostering the illusion of legitimacy and enticing the user to execute it. Subsequent to the execution of the WSF file, the infection progresses autonomously, necessitating no further user intervention. The subsequent stages of the infection chain encompass the deployment of Visual Basic Script (VBS), JavaScript (JS), Batch (BAT), Text (TXT), and PowerShell (PS1) files. Ultimately, the chain culminates in a process injection targeting aspnet_compiler.exe.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191259 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture2.png\" alt=\"\" width=\"626\" height=\"361\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture2.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture2-300x173.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture2-205x118.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 2: Infection Chain<\/em><\/p>\n<h2><strong>Technical Analysis<\/strong><\/h2>\n<p>Upon opening a spam email, the recipient unwittingly encounters a web link embedded within its contents. Upon clicking on the link, it triggers the opening of an HTML page. Simultaneously, the page initiates the download of a WSF (Windows Script File), setting into motion a potentially perilous sequence of events.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191274 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture3.png\" alt=\"\" width=\"1237\" height=\"607\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture3.png 1237w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture3-300x147.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture3-1024x502.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture3-768x377.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture3-205x101.png 205w\" sizes=\"auto, (max-width: 1237px) 100vw, 1237px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 3:HTML page<\/em><\/p>\n<p>The HTML file initiates the download of a WSF file. Disguised as an order-related document with numerous blank lines, the WSF file conceals malicious intent. \u00a0After its execution, no user interaction is required.<\/p>\n<p>On executing wsf, we get the following process tree:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191289 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture4.png\" alt=\"\" width=\"626\" height=\"187\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture4.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture4-300x90.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture4-205x61.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 4: Process tree<\/em><\/p>\n<h2><strong>Commandlines:<br \/>\n<\/strong><\/h2>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191664 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture31.png\" alt=\"\" width=\"624\" height=\"479\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture31.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture31-300x230.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture31-168x129.png 168w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/center><center><\/center>Upon investigation, we discovered the presence of code lines in wsf file that facilitate the download of another text file.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191304 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture5.png\" alt=\"\" width=\"778\" height=\"606\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture5.png 778w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture5-300x234.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture5-768x598.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture5-166x129.png 166w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 5:Content of wsf file<\/em><\/p>\n<p>The downloaded text file, named &#8220;1.txt,&#8221; contains specific lines of code. These lines are programmed to download another file, referred to as &#8220;r.jpg,&#8221; but it is actually saved in the public folder under the name &#8220;ty.zip.&#8221; Subsequently, this zip file is extracted within the same public folder, resulting in the creation of multiple files.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191319 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture6.png\" alt=\"\" width=\"938\" height=\"804\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture6.png 938w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture6-300x257.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture6-768x658.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture6-151x129.png 151w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 6: Marked files are extracted in a public folder<\/em><\/p>\n<h2><strong>Infection sequence:<\/strong><\/h2>\n<p>a) The &#8220;ty.zip&#8221; file comprises 17 additional files. Among these, the file named &#8220;basta.js&#8221; is the first to be executed. The content of \u201cbasta.js\u201d is as follows:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191334 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture7.png\" alt=\"\" width=\"412\" height=\"259\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture7.png 412w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture7-300x189.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture7-205x129.png 205w\" sizes=\"auto, (max-width: 412px) 100vw, 412px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 7: basta.js<\/em><\/p>\n<p>b) \u201cbasta.js\u201d invoked \u201cnode.bat<strong>\u201d<\/strong> file from the same folder.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191349 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture8.png\" alt=\"\" width=\"523\" height=\"213\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture8.png 523w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture8-300x122.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture8-205x83.png 205w\" sizes=\"auto, (max-width: 523px) 100vw, 523px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 8: node.js<\/em><\/p>\n<p>Explaining the command present in node.bat:<\/p>\n<ul>\n<li>$tr = New-Object -ComObject Schedule.Service;\n<ul>\n<li>This creates a new instance of the Windows Task Scheduler COM object.<\/li>\n<\/ul>\n<\/li>\n<li>$tr.Connect();\n<ul>\n<li>This connects to the Task Scheduler service.<\/li>\n<\/ul>\n<\/li>\n<li>$ta = $tr.NewTask(0);\n<ul>\n<li>This creates a new task object.<\/li>\n<\/ul>\n<\/li>\n<li>$ta.RegistrationInfo.Description = &#8216;Runs a script every 2 minutes&#8217;;\n<ul>\n<li>This sets the description of the task.<\/li>\n<\/ul>\n<\/li>\n<li>$ta.Settings.Enabled = $true;\n<ul>\n<li>This enables the task.<\/li>\n<\/ul>\n<\/li>\n<li>$ta.Settings.DisallowStartIfOnBatteries = $false;\n<ul>\n<li>This allows the task to start even if the system is on battery power.<\/li>\n<\/ul>\n<\/li>\n<li>$st = $ta.Triggers.Create(1);\n<ul>\n<li>This creates a trigger for the task. The value 1 corresponds to a trigger type of &#8220;Daily&#8221;.<\/li>\n<\/ul>\n<\/li>\n<li>$st.StartBoundary = [DateTime]::Now.ToString(&#8216;yyyy-MM-ddTHH:mm:ss&#8217;);\n<ul>\n<li>This sets the start time for the trigger to the current time.<\/li>\n<\/ul>\n<\/li>\n<li>$st.Repetition.Interval = &#8216;PT2M&#8217;;\n<ul>\n<li>This sets the repetition interval for the trigger to 2 minutes.<\/li>\n<\/ul>\n<\/li>\n<li>$md = $ta.Actions.Create(0);\n<ul>\n<li>This creates an action for the task. The value 0 corresponds to an action type of &#8220;Execute&#8221;.<\/li>\n<\/ul>\n<\/li>\n<li>$md.Path = &#8216;C:\\Users\\Public\\app.js&#8217;;\n<ul>\n<li>This sets the path of the script to be executed by the task.<\/li>\n<\/ul>\n<\/li>\n<li>$ns = $tr.GetFolder(&#8216;\\&#8217;);\n<ul>\n<li>This gets the root folder of the Task Scheduler.<\/li>\n<\/ul>\n<\/li>\n<li>$ns.RegisterTaskDefinition(&#8216;cafee&#8217;, $ta, 6, $null, $null, 3);\n<ul>\n<li>This registers the task definition with the Task Scheduler. The task is named &#8220;cafee&#8221;. The parameters 6 and 3 correspond to constants for updating an existing task and allowing the task to be run on demand, respectively.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>To summarize, the command sets up a scheduled task called &#8220;cafee&#8221; which is designed to execute the &#8220;app.js&#8221; script found in the C:\\Users\\Public\\ directory every 2 minutes. The primary purpose of this script is to maintain persistence on the system.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191364 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture9.png\" alt=\"\" width=\"593\" height=\"318\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture9.png 593w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture9-300x161.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture9-205x110.png 205w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 9: Schedule task entry<\/em><\/p>\n<p>c) Now \u201c<strong>app.js<\/strong>\u201d is executed and it executes \u201c<strong>t.bat<\/strong>\u201d from the same folder.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191379 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture10.png\" alt=\"\" width=\"501\" height=\"293\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture10.png 501w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture10-300x175.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture10-205x120.png 205w\" sizes=\"auto, (max-width: 501px) 100vw, 501px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 10:app.js<\/em><\/p>\n<p>d) <strong>\u201ct.bat\u201d<\/strong> has little obfuscated code which after concatenating becomes: <em>\u201cPowershell.exe -ExecutionPolicy Bypass -File &#8220;&#8221;C:\\Users\\Public\\t.ps1\u201d<\/em><\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191394 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture11.png\" alt=\"\" width=\"504\" height=\"160\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture11.png 504w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture11-300x95.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture11-205x65.png 205w\" sizes=\"auto, (max-width: 504px) 100vw, 504px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 11: Content of t.bat<\/em><\/p>\n<p>e) Now the powershell script \u201ct.ps1\u201d is invoked. This is the main script that is responsible for injection.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191409 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture12.png\" alt=\"\" width=\"626\" height=\"408\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture12.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture12-300x196.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture12-198x129.png 198w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 12: Content of t.ps1<\/em><\/p>\n<p>There are 2 functions defined in it:<\/p>\n<p>A) function fun_alosh()<br \/>\nThis function is used in the last for decoding $tLx and $Uk<\/p>\n<p>B) Function FH ()<br \/>\nThis function is used only once to decode the content of \u201cC:\\\\Users\\\\Public\\\\Framework.txt\u201d. This function takes a binary string as input, converts it into a sequence of ASCII characters, and returns the resulting string.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191424 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture13.png\" alt=\"\" width=\"529\" height=\"165\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture13.png 529w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture13-300x94.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture13-205x64.png 205w\" sizes=\"auto, (max-width: 529px) 100vw, 529px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 13: Content of Framework.txt<\/em><\/p>\n<p>After decoding the contents of &#8220;C:\\Users\\Public\\Framework.txt&#8221; using CyberChef, we are able to reveal the name of the final binary file targeted for injection.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191439 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture14.png\" alt=\"\" width=\"938\" height=\"557\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture14.png 938w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture14-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture14-768x456.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture14-205x122.png 205w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 14: Binary to Hex, Hex to Ascii Conversion using CyberChef<\/em><\/p>\n<p>This technique aims to evade detection by concealing suspicious keywords within the script. Same way other keywords are also stored in txt files, such as:<\/p>\n<p>Content of other text files are:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191454 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture15.png\" alt=\"\" width=\"546\" height=\"426\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture15.png 546w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture15-300x234.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture15-165x129.png 165w\" sizes=\"auto, (max-width: 546px) 100vw, 546px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 15: Content of other files<\/em><\/p>\n<p>After replacing all the names and reframing sentences. Below is the result.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191469 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture16.png\" alt=\"\" width=\"626\" height=\"133\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture16.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture16-300x64.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture16-205x44.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 16: Injection code<\/em><\/p>\n<p>Now, the two variables left are decrypted by fun_alosh.<\/p>\n<p>After decrypting and saving them, it was discovered that both files are PE files, with one being a DLL ($tLx) and the other an exe ($Uk).<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191484 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture17.png\" alt=\"\" width=\"807\" height=\"480\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture17.png 807w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture17-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture17-768x457.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture17-205x122.png 205w\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 17: Decoded binaries<\/em><\/p>\n<p>Process injection in aspnet_compiler.exe.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191499 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture18.png\" alt=\"\" width=\"425\" height=\"355\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture18.png 425w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture18-300x251.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture18-154x129.png 154w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 18:\u00a0 Process injection in aspnet_compiler.exe<\/em><\/p>\n<p>Once all background tasks are finished, a deceptive Amazon page emerges solely to entice the user.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191514 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture19.jpg\" alt=\"\" width=\"665\" height=\"450\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture19.jpg 665w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture19-300x203.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture19-191x129.jpg 191w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 19: Fake Amazon page<\/em><\/p>\n<h2><strong>Analysis of Binaries:<\/strong><\/h2>\n<p>The Dll file is packed with confuserEX and as shown, the type is mentioned \u2018NewPE2.PE\u2019 and Method is mentioned \u2018Execute\u2019.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191529 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture20.png\" alt=\"\" width=\"541\" height=\"260\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture20.png 541w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture20-300x144.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture20-205x99.png 205w\" sizes=\"auto, (max-width: 541px) 100vw, 541px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 20: Confuser packed DLL<\/em><\/p>\n<p>The second file is named AsyncClient123 which is highly obfuscated.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191544 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture21.png\" alt=\"\" width=\"526\" height=\"140\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture21.png 526w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture21-300x80.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture21-205x55.png 205w\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 21: AsyncRat payload<\/em><\/p>\n<p>To summarize the main execution flow of &#8220;AsyncRAT&#8221;, we can outline the following steps:<\/p>\n<ul>\n<li>Initialize its configuration (decrypts the strings).<\/li>\n<li>Verifies and creates a Mutex (to avoid running duplicated instances).<\/li>\n<li>If configured through the settings, the program will automatically exit upon detecting a virtualized or analysis environment.<\/li>\n<li>Establishes persistence in the system.<\/li>\n<li>Collect data from the victim&#8217;s machine.<\/li>\n<li>Establish a connection with the server.<\/li>\n<\/ul>\n<p>The decrypting function is used to decrypt strings.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191559 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture22.png\" alt=\"\" width=\"531\" height=\"65\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture22.png 531w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture22-300x37.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture22-205x25.png 205w\" sizes=\"auto, (max-width: 531px) 100vw, 531px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 22: Decrypting Function<\/em><\/p>\n<p>The program creates a mutex to prevent multiple instances from running simultaneously.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191574 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture23.png\" alt=\"\" width=\"624\" height=\"233\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture23.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture23-300x112.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture23-205x77.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 23: Creating Mutex<\/em><\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191589 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture24.png\" alt=\"\" width=\"626\" height=\"174\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture24.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture24-300x83.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture24-205x57.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 24: Mutex in process explorer<\/em><\/p>\n<p>Checking the presence of a debugger.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191604 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture25.png\" alt=\"\" width=\"511\" height=\"197\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture25.png 511w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture25-300x116.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture25-205x79.png 205w\" sizes=\"auto, (max-width: 511px) 100vw, 511px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 25: Anti analysis code<\/em><\/p>\n<p>Collecting data from the system.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191619 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture26.png\" alt=\"\" width=\"435\" height=\"219\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture26.png 435w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture26-300x151.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture26-205x103.png 205w\" sizes=\"auto, (max-width: 435px) 100vw, 435px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 26: Code for collecting data from system<\/em><\/p>\n<p>Establish a connection with the server.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191634 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture27.png\" alt=\"\" width=\"494\" height=\"313\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture27.png 494w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture27-300x190.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture27-205x129.png 205w\" sizes=\"auto, (max-width: 494px) 100vw, 494px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 27: Code for C2 connection<\/em><\/p>\n<p>Process injection in aspnet_compiler.exe:<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-191649 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture28.png\" alt=\"\" width=\"494\" height=\"412\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture28.png 494w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture28-300x250.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/Picture28-155x129.png 155w\" sizes=\"auto, (max-width: 494px) 100vw, 494px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em>Figure 28: C2 communication<\/em><\/p>\n<h2><strong>Conclusion:<\/strong><\/h2>\n<p>In this blog post, we dissect the entire attack sequence of AsyncRAT, beginning with an HTML file that triggers the download of a WSF file, and culminating in the injection of the final payload. Such tactics are frequently employed by attackers to gain an initial foothold. We anticipate a rise in the utilization of these file types following Microsoft&#8217;s implementation of protections against malicious Microsoft Office macros, which have also been widely exploited for malware delivery. McAfee labs consistently advise users to refrain from opening files from unknown sources, particularly those received via email. For organizations, we highly recommend conducting security training for employees and implementing a secure web gateway equipped with advanced threat protection. This setup enables real-time scanning and detection of malicious files, enhancing organizational security.<\/p>\n<h2><strong>Mitigation:<\/strong><\/h2>\n<p>Avoiding falling victim to email phishing involves adopting a vigilant and cautious approach. Here are some common practices to help prevent falling prey to email phishing:<\/p>\n<ul>\n<li>Verify Sender Information<\/li>\n<li>Think Before Clicking Links and Warnings<\/li>\n<li>Check for Spelling and Grammar Errors<\/li>\n<li>Be Cautious with Email Content<\/li>\n<li>Verify Unusual Requests<\/li>\n<li>Use Email Spam Filters<\/li>\n<li>Check for Secure HTTP Connections<\/li>\n<li>Delete Suspicious Emails<\/li>\n<li>Keep Windows and Security Software Up to date<\/li>\n<li>Use the latest and patched version of Acrobat reader<\/li>\n<\/ul>\n<h2><strong>IOCs (Indicators of compromise):<\/strong><\/h2>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"16%\"><strong>File<\/strong><\/td>\n<td width=\"83%\"><strong>SHA256<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"16%\"><strong>HTML<\/strong><\/td>\n<td width=\"83%\">969c50f319a591b79037ca50cda55a1bcf2c4284e6ea090a68210039034211db<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">WSF<\/td>\n<td width=\"83%\">ec6805562419e16de9609e2a210464d58801c8b8be964f876cf062e4ab52681a<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">ty.zip<\/td>\n<td width=\"83%\">daee41645adcf22576def12cb42576a07ed5f181a71d3f241c2c14271aad308b<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">basta.js<\/td>\n<td width=\"83%\">909ec84dfa3f2a00431a20d4b8a241f2959cac2ea402692fd46f4b7dbf247e90<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">node.bat<\/td>\n<td width=\"83%\">569e33818e6af315b5f290442f9e27dc6c56a25259d9c9866b2ffb4176d07103<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">app.js<\/td>\n<td width=\"83%\">7d8a4aa184eb350f4be8706afb0d7527fca40c4667ab0491217b9e1e9d0f9c81<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">t.bat<\/td>\n<td width=\"83%\">e2d30095e7825589c3ebd198f31e4c24e213d9f43fc3bb1ab2cf06b70c6eac1d<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">t.ps1<\/td>\n<td width=\"83%\">a0c40aa214cb28caaf1a2f5db136bb079780f05cba50e84bbaeed101f0de7fb3<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">exe<\/td>\n<td width=\"83%\">0d6bc7db43872fc4d012124447d3d050b123200b720d305324ec7631f739d98d<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">dll<\/td>\n<td width=\"83%\">b46cd34f7a2d3db257343501fe47bdab67e796700f150b8c51a28bb30650c28f<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">URL<\/td>\n<td width=\"83%\">hxxp:\/\/142.202.240[.]40:222\/1.txt<\/td>\n<\/tr>\n<tr>\n<td width=\"16%\">URL<\/td>\n<td width=\"83%\">hxxp:\/\/142.202.240[.]40:222\/r.jpg<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as &#8220;Asynchronous Remote Access Trojan,&#8221; represents a highly sophisticated malware&#8230;<\/p>\n","protected":false},"author":695,"featured_media":191679,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-191243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as &quot;Asynchronous Remote Access Trojan,&quot; represents a highly sophisticated malware variant\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as &quot;Asynchronous Remote Access Trojan,&quot; represents a highly sophisticated malware variant\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-08T18:14:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-08T18:21:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats\",\"datePublished\":\"2024-05-08T18:14:14+00:00\",\"dateModified\":\"2024-05-08T18:21:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/\"},\"wordCount\":1608,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/\",\"name\":\"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png\",\"datePublished\":\"2024-05-08T18:14:14+00:00\",\"dateModified\":\"2024-05-08T18:21:14+00:00\",\"description\":\"Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as \\\"Asynchronous Remote Access Trojan,\\\" represents a highly sophisticated malware variant\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats | McAfee Blog","description":"Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as \"Asynchronous Remote Access Trojan,\" represents a highly sophisticated malware variant","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats | McAfee Blog","og_description":"Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as \"Asynchronous Remote Access Trojan,\" represents a highly sophisticated malware variant","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-05-08T18:14:14+00:00","article_modified_time":"2024-05-08T18:21:14+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats","datePublished":"2024-05-08T18:14:14+00:00","dateModified":"2024-05-08T18:21:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/"},"wordCount":1608,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/","name":"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png","datePublished":"2024-05-08T18:14:14+00:00","dateModified":"2024-05-08T18:21:14+00:00","description":"Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as \"Asynchronous Remote Access Trojan,\" represents a highly sophisticated malware variant","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/300x200_Blog_062223.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-spam-to-asyncrat-tracking-the-surge-in-non-pe-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/191243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=191243"}],"version-history":[{"count":7,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/191243\/revisions"}],"predecessor-version":[{"id":191715,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/191243\/revisions\/191715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/191679"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=191243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=191243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=191243"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=191243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}