ESET researchers have mapped out the intricate web formed by AsyncRAT’s open-source codebase, revealing a constantly shifting threat landscape defined by new features, evasion techniques, and a parade of technical oddities.
AsyncRAT originated as an open-source project on GitHub in 2019, authored in C# and designed for remote access through functionalities like keylogging, screen capture, and credential theft.
While bearing conceptual resemblance to the older Quasar RAT, AsyncRAT is a from-scratch rewrite that notably borrows cryptographic code, particularly its Aes256 and Sha256 classes—from Quasar:
csharp// Snippet from AsyncRAT cryptography module
namespace Client.Algorithm
{
public class Aes256
{
private static readonly byte[] Salt = { ... };
// ...rest of cryptographic routines...
}
}
The above snippet highlights the key technical detail: the salt value and encryption logic are virtually identical to Quasar, demonstrating how ideas are ported even between diverging codebases.
Despite this, AsyncRAT’s core is modular and highly extensible, fueling its rapid adoption.
AsyncRAT’s public release triggered a burst of derivative projects, each adding new tricks or disguises.
Two forks stand out:
MessagePack and implements advanced defense evasion: Taskmgr.exe, ProcessHacker.exe, and MsMpEng.exe.csharp// DcRat's AMSI patching routine
[DllImport("amsi.dll")]
public static extern int AmsiScanBuffer(IntPtr session, byte[] buffer, ...);
Identification relies on examining the Version field in the AES-256 encrypted configuration—often readily visible—or investigating the Salt parameter or embedded X.509 certificates.
More advanced methods involve active probing of C&C servers and code structure analysis.
Beyond mainstream forks, niche variants show inventive plugin development:
| Plugin Name | Functionality |
|---|---|
| Screamer.dll | Jump scare with built-in images and WAV playback |
| WormUsb.dll | Infects other executables via USB/PEN drives |
| Brute.dll | SSH and FTP credential brute-forcing |
| cliper.dll | Clipboard hijack—replaces wallet addresses |
| Signature Antivirus.dll | Deletes files matching attacker-supplied MD5s |
The technical innovation sometimes borders on parody—JasonRAT obscures its strings with a custom Morse code variant (.--. .- ... ... .-- --- .-. -.. ...) and adopts variable names from esoteric “satanic” vocabularies.
NonEuclid RAT introduces plugins for geolocation harvesting (Maps.dll) and file brute-forcing, while XieBroRAT adds browser credential theft through BrowserGhost.dll and Cobalt Strike integration.
As the AsyncRAT ecosystem matures, the proliferation of ever-more modular and evasive forks significantly lowers the technical barrier for cybercriminals.
Security defenders should expect the evolution of even more obfuscated, plugin-rich forks, demanding constant vigilance and dynamic detection strategies to keep pace with these threats.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant updates
The post New AsyncRAT Forks Discovered with Advanced Features Like Screamers and USB Spreaders appeared first on Cyber Security News.
A North Korea-linked hacking group known as WaterPlum has introduced a dangerous new malware called…
A critical security flaw in Microsoft SharePoint has been identified as actively exploited, and on…
A dangerous new malware implant called SnappyClient has quietly emerged as a serious threat to…
High-quality visuals are essential for capturing attention online. Whether for social media, blog posts, or…
Why your stalled AI pilots are the most valuable thing in your transformation program While…
If the last three years of artificial intelligence were defined by shock and experimentation, 2026…
This website uses cookies.