AsyncRAT - Daily Threat Report

Thursday, April 2, 2026

Daily Summary

AsyncRAT activity remains stable with 11 new samples, aligning closely with the 7-day average of 10. The 10% variance is not operationally significant, indicating consistent, low-volume deployment by threat actors.

New Samples Detected

The sample set shows a diverse payload strategy. While .exe files are most common (6 samples), the presence of .vbs (2) and .bat (2) scripts indicates a continued focus on script-based execution to bypass initial perimeter controls. The single .bin file may represent a packed or obfuscated payload.

Distribution Methods

The file type mix suggests delivery through phishing campaigns with malicious attachments, likely combined with archive files (ZIP/RAR) to distribute the scripts and executables. Script-based samples (.vbs, .bat) are commonly used in malicious email campaigns that leverage social engineering to enable macros or direct script execution.

Detection Rate

Current variants show moderate detection rates by aggregate AV engines. However, the script-based samples (.vbs, .bat) often have lower initial detection scores than the .exe files, suggesting threat actors may be using script obfuscation to achieve temporary evasion until signatures are updated.

C2 Infrastructure

A notable surge in infrastructure was observed with 100 new C2 servers identified, a significant increase from typical daily registration. This scale of new infrastructure often precedes a broader campaign or indicates actors are preparing fresh resources for distribution, though no specific geographic pattern is evident from the provided data.

7-Day Trend

Activity has been consistently steady over the past week, hovering around 10 samples daily. This pattern suggests automated, sustained operations rather than a large, focused campaign.

Security Analysis

The concurrent surge in C2 servers (100) against a stable sample count is a notable divergence. This may indicate actors are shifting to a infrastructure-heavy model with more, shorter-lived servers to improve resilience against takedowns, or preparing for a future payload distribution wave. Defensive teams should prioritize monitoring for network connections to newly registered domains and IPs, as current endpoint detection may lag for script-based initial access. A key recommendation is to enhance email security filtering to block or sandbox .vbs and .bat attachments, a common vector for this family’s current activity.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)