Skip to main content
Skip to main content
Published Sep 13, 2023 | Updated Jan 25, 2026

TrojanDownloader:Win64/AsyncRAT.D!MTB

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

In the current threat landscape of early 2026, AsyncRAT maintains a significant presence as a Remote Access Trojan (RAT). Its journey from an open-source administrative tool published on GitHub in 2019 to a mainstream malware family demonstrates how adaptable codebases become weaponized. The proliferation of hundreds of distinct forks by late 2025 highlights a development model that empowers everyone from script kiddies to state-sponsored threat actors to tailor the tool for specific goals. This customization capacity directly contributes to its persistent ranking among top global malware families, where it often places within the top ten in prevalence reports. 

Its ongoing relevance stems from a strategic evolution beyond a simple binary. Modern deployments now favor multi-stage, fileless infection chains that cleverly abuse trusted cloud infrastructure and native Windows processes. This approach specifically targets the weaknesses of conventional endpoint detection, allowing AsyncRAT to operate stealthily. The shift signifies a broader trend where threat actors continuously refine delivery and launch methods to bypass modern security controls. 

  • Immediately isolate the infected device from all network connections to sever C2 communication. 
  • Use a tool like Process Explorer to terminate suspicious instances of wscript.exe, powershell.exe, or python.exe with anomalous command lines or parent processes. 
  • Open Task Scheduler and delete any malicious tasks with names like "Reklam," "Rekill," or "3losh." 
  • Navigate to the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and remove any entries pointing to suspicious scripts in public or temp folders. 
  • Manually search for and delete all malware artifacts from %TEMP%, C:\Users\Public\, and C:\ProgramData\, focusing on filenames like Webcentral.vbs, logs.ldr, snakers.zip, and new.bin

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us