We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
TrojanDownloader:Win64/AsyncRAT.D!MTB
Aliases: No associated aliases
Summary
In the current threat landscape of early 2026, AsyncRAT maintains a significant presence as a Remote Access Trojan (RAT). Its journey from an open-source administrative tool published on GitHub in 2019 to a mainstream malware family demonstrates how adaptable codebases become weaponized. The proliferation of hundreds of distinct forks by late 2025 highlights a development model that empowers everyone from script kiddies to state-sponsored threat actors to tailor the tool for specific goals. This customization capacity directly contributes to its persistent ranking among top global malware families, where it often places within the top ten in prevalence reports.
Its ongoing relevance stems from a strategic evolution beyond a simple binary. Modern deployments now favor multi-stage, fileless infection chains that cleverly abuse trusted cloud infrastructure and native Windows processes. This approach specifically targets the weaknesses of conventional endpoint detection, allowing AsyncRAT to operate stealthily. The shift signifies a broader trend where threat actors continuously refine delivery and launch methods to bypass modern security controls.
- Immediately isolate the infected device from all network connections to sever C2 communication.
- Use a tool like Process Explorer to terminate suspicious instances of wscript.exe, powershell.exe, or python.exe with anomalous command lines or parent processes.
- Open Task Scheduler and delete any malicious tasks with names like "Reklam," "Rekill," or "3losh."
- Navigate to the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and remove any entries pointing to suspicious scripts in public or temp folders.
- Manually search for and delete all malware artifacts from %TEMP%, C:\Users\Public\, and C:\ProgramData\, focusing on filenames like Webcentral.vbs, logs.ldr, snakers.zip, and new.bin.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.