AsyncRAT - How to Remove

Last updated: 2026-04-01

AsyncRAT Incident Response Guide

Incident Triage Steps

Within the first 30 minutes, prioritize speed to assess the scope of an AsyncRAT infection. This malware is a remote access trojan that establishes persistent backdoor access, so immediate action is critical.

1. Identify Initial Compromise Indicators:

  • Check security logs for suspicious process creation, particularly instances of rundll32.exe, regsvr32.exe, or mshta.exe executing unexpected scripts or DLLs, as AsyncRAT often uses living-off-the-land binaries (LOLBins) for execution.
  • Review firewall or endpoint logs for outbound connections to suspicious IP addresses or domains on ports commonly used by AsyncRAT, such as TCP 6606, 8080, or 4444. Look for beaconing behavior (regular, timed connections).
  • Immediately query your EDR solution or SIEM platform for known AsyncRAT file paths, including:
    • %AppData%\[Random Folder Name]\
    • %LocalAppData%\[Random Folder Name]\
    • %Temp%\[Random Name].exe or .dll
    • %Public%\ or %ProgramData%\ for dropped executables.

2. Determine Scope and Impact:

  • Isolate the initially reported host from the network but leave it powered on for evidence collection.
  • Use your EDR console to perform a rapid cross-system search for the identified malicious processes, file hashes, or network connections. AsyncRAT configurations often include a mutex name; search running processes for mutexes like “AsyncRAT” or other hardcoded strings.
  • Check for signs of data exfiltration specific to AsyncRAT:
    • Examine proxy logs for large, sustained uploads from infected hosts to unfamiliar external IPs.
    • Review the “Downloads” or “Documents” folders on the initial host for unexpected archive files (ZIP, RAR) that may have been staged for exfiltration, as AsyncRAT has file-stealing capabilities.
    • Look for anomalous outbound SMB or RDP connections from the infected host to other internal systems, indicating lateral movement attempts.

3. Initial Decision Point: Based on the findings, classify the incident. A single isolated host may indicate a targeted attack or a successful endpoint block. Multiple infected hosts suggest a spreading infection, possibly via stolen credentials or exploits, requiring immediate containment.

Evidence Collection

Before any remediation, collect forensic artifacts to understand the attack’s root cause and full scope.

1. Volatile Memory Acquisition:

  • On key infected systems (especially the patient zero if identifiable), take a full memory dump using a trusted forensic tool. AsyncRAT payloads, configuration data, and decrypted strings may reside only in memory.

2. Host-Based Artifacts:

  • Process Information: Capture a detailed process listing with command-line arguments, parent process IDs, and loaded modules. Look for processes injecting into legitimate Windows processes.
  • File System: Collect the AsyncRAT executable, its dropped DLLs, and any associated files from the paths identified during triage. Preserve the %AppData% and %LocalAppData% directories of the compromised user profile.
  • Registry: Export relevant registry hives, focusing on AsyncRAT persistence mechanisms:
    • HKCU\Software\Microsoft\Windows\CurrentVersion\Run
    • HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
    • HKLM\Software\Microsoft\Windows\CurrentVersion\Run
    • Scheduled Tasks: Check for tasks created via schtasks or the Task Scheduler library.
  • Logs: Export Windows Event Logs (Security, System, Application, PowerShell Operational) from the time of initial compromise. Focus on Event ID 4688 (process creation) and 4104 (PowerScript block execution).

3. Network Evidence:

  • Preserve full packet captures (PCAPs) from network sensors or the host itself, if possible, focusing on traffic to and from the identified C2 IPs/domains.
  • Collect firewall, proxy, and DNS query logs for all suspected hosts to map C2 communication and potential lateral movement.

Containment Procedures

Contain the threat to prevent further data loss or network compromise.

1. Network Segmentation:

  • Immediately block the identified AsyncRAT Command and Control (C2) server IP addresses and domains at the network firewall and DNS filtering layer.
  • Segment off infected network segments or VLANs. If possible, move confirmed compromised hosts to an isolated quarantine network.
  • For hosts where infection is suspected but not confirmed, implement strict egress filtering to block connections to non-essential external ports and IP ranges.

2. Host Containment:

  • Do NOT simply terminate the AsyncRAT process, as it may have persistence mechanisms that will restart it. Instead, use your EDR solution to suspend the malicious process and its child processes to halt activity while preserving the state for analysis.
  • Disable compromised user accounts suspected of being used by the attacker. Scope this by reviewing logon events from infected systems.

3. Credential Security:

  • Given AsyncRAT’s keylogging and credential theft capabilities, plan for a mandatory password reset for all users who logged onto infected machines. Prioritize administrative and service accounts.
  • Review domain controllers for unusual authentication events (e.g., Kerberos ticket requests) originating from infected hosts.

Eradication and Recovery

Completely remove AsyncRAT and restore systems to a trusted state.

1. Guided Removal:

  • Follow the detailed, step-by-step procedures in the dedicated AsyncRAT Removal Guide. This guide provides specific instructions for:
    • Terminating malicious processes.
    • Deleting all associated files from the filesystem.
    • Removing persistence entries from the Registry and Scheduled Tasks.
    • Cleaning up any modified system shortcuts or file associations.

2. Validation and Restoration:

  • After executing the removal steps, validate the system is clean. Rescan with updated antivirus and EDR tools. Re-check for the previously identified network connections, mutexes, and file artifacts.
  • For critically infected systems or where the integrity of the OS is in doubt, rebuild the host from a known-clean gold image.
  • Restore any stolen or corrupted data from clean, offline backups. Ensure backups are from a date prior to the estimated compromise timeline.

3. Return to Service:

  • Before re-introducing a system to the production network, monitor it in a controlled environment for any residual malicious activity.
  • Re-enable the system only after verifying successful patching of the initial entry vector (e.g., the exploited vulnerability).

Lessons Learned Checklist

After eradication, conduct a formal review to improve defenses.

  • Initial Access: How did AsyncRAT initially execute? Was it via a malicious email attachment, drive-by download, exploited vulnerability (e.g., in public-facing software), or compromised third-party software?
  • Control Failures: Which security controls did not prevent or detect the incident?
    • Was email filtering bypassed?
    • Did endpoint protection fail to block the payload or its behaviors?
    • Were network-based IDS/IPS signatures for AsyncRAT C2 traffic missing or not alerting?
  • Detection Gaps: How long was the malware active before detection? Were the current SIEM alerts and EDR rules sufficient to catch AsyncRAT’s specific behaviors (LOLBin execution, specific registry writes, network beaconing)?
  • Lateral Movement: Did the attacker move beyond the initial host? If so, how (e.g., Pass-the-Hash, exploiting SMB vulnerabilities)? Were network segmentation controls effective?
  • Improvement Plan: Based on the answers:
    • Update detection rules in your SIEM and EDR to flag AsyncRAT’s unique artifacts and TTPs.
    • Harden endpoints by restricting LOLBin usage via application control policies where possible.
    • Improve email security filtering and user phishing training.
    • Ensure all systems are patched, especially against the vulnerability used for initial access.
    • Review and strengthen credential hygiene policies and implement multi-factor authentication.

For proactive measures, refer to the AsyncRAT Detection Guide. For more background on this threat, see the AsyncRAT Overview.