AsyncRAT - Removal Guide

Last updated: 2026-04-01

AsyncRAT Removal and Recovery Guide

Signs of Infection

AsyncRAT infection manifests through specific artifacts and behaviors. Detection requires correlation across endpoints and network monitoring.

File System Artifacts:

  • Look for suspicious executable files in user profile directories, particularly %AppData%, %LocalAppData%, and %Temp%. AsyncRAT often uses names mimicking legitimate software or random alphanumeric strings (e.g., chrome_update.exe, svchosts.exe, r48f9q.exe).
  • Check for dropped configuration or data files in %AppData%\Microsoft\ or %Public% directories. These may be .bin, .dat, or .cfg files.
  • Presence of suspicious libraries (.dll) in application folders, especially those recently created or with low prevalence hashes.

Process and Memory Behaviors:

  • Identify processes with mismatched parent-child relationships (e.g., explorer.exe spawning a suspicious executable).
  • Look for processes injecting code into legitimate Windows processes like svchost.exe, winlogon.exe, or explorer.exe to blend in.
  • Monitor for unusual outbound network connections from non-browser processes, especially on uncommon ports (e.g., high ports above 49152).

Network Indicators:

  • Beaconing traffic to external IP addresses or domains with low reputation, often at regular intervals (e.g., every 30-60 seconds).
  • Use of non-standard protocols (e.g., raw TCP, custom encryption) for command and control (C2) communication.
  • Unusual volume of data egress from a workstation, particularly from a user’s profile directory.

Registry Persistence:

  • Check common autostart locations: HKCU\Software\Microsoft\Windows\CurrentVersion\Run, HKLM\Software\Microsoft\Windows\CurrentVersion\Run, and RunOnce keys.
  • Look for services or scheduled tasks created with obscure names or descriptions.

Immediate Containment Steps

Upon confirming or strongly suspecting an AsyncRAT infection, take these steps within the first 15 minutes to limit damage.

  1. Network Isolation: Immediately disconnect the infected host from the network. Disable its network adapter(s) via the operating system or physically unplug the Ethernet cable. If using enterprise wireless, revoke its network authentication. Place the host in an isolated VLAN if remote management is required for investigation.
  2. Process Termination: Using a dedicated incident response tool or command line, identify and terminate the malicious process(es). Note the full process path and PID for later analysis. Be aware of potential process hollowing or injection where the malicious thread runs under a legitimate process; in such cases, terminating the host process may be necessary but can cause system instability.
  3. Credential Security Priority:
    • Local Admin Accounts: Force a password change for any local administrator accounts on the compromised machine. AsyncRAT often harvests credentials stored in memory or on disk.
    • Logged-in User Account: The account active during the infection should be considered compromised. Reset its password immediately from a trusted, clean device. If the account is a domain user, coordinate with identity management teams to reset the password and review sign-in logs.
    • Cached Credentials: Clear cached domain credentials on the infected host using the cmdkey /delete and klist purge commands from an elevated command prompt after containment.
  4. Preserve Evidence: Before cleaning, consider taking a forensic disk image or memory capture if approved by your incident response policy. At a minimum, collect relevant files (suspicious executables, logs), a running process list, network connections, and a registry export of autostart locations.

Manual Removal Process

This process assumes you have isolated the host and are working directly on it or via a secure out-of-band management channel.

Step 1: Terminate Malicious Processes.

  • Open the Windows Task Manager or a command-line tool like tasklist.
  • Identify the malicious process(es) based on earlier detection (e.g., strange name, high CPU with no user activity, suspicious path).
  • Terminate the process. If it respawns, it has a persistence mechanism that must be removed first.

Step 2: Remove Persistence Mechanisms.

  • Registry Run Keys: Open the Registry Editor (regedit). Navigate to and delete any malicious entries in:
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
    • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
    • Check RunOnce keys as well.
  • Scheduled Tasks: Open Task Scheduler. Review tasks for suspiciously named entries, especially those pointing to executable paths in %AppData% or %Temp%. Delete any malicious tasks.
  • Services: Open the Services console (services.msc). Look for services with odd names, missing descriptions, or paths pointing to user directories. Note: Stopping and deleting a service requires administrative privileges. Use sc query and sc delete from an elevated command prompt if needed.

Step 3: Delete Dropped Files.

  • Navigate to the file paths identified during detection (common locations listed in Signs of Infection).
  • Enable viewing of hidden files and protected operating system files in Folder Options.
  • Delete the primary malicious executable, any associated configuration files (.dat, .cfg, .bin), and dropped modules or libraries.
  • Empty the Recycle Bin.

Step 4: Clean Registry Entries.

  • Beyond autostart keys, search the registry for references to the file paths of the deleted malware. Common locations include HKCU\Software\ and HKLM\Software\ under keys named after the malware or a fake software name.
  • Exercise extreme caution when editing the registry. Back up any keys before deletion.

Verifying Removal

Complete removal requires validation across multiple layers.

  1. File System Verification: Re-scan the previously infected directories (%AppData%, %LocalAppData%, %Temp%, system32) with your antivirus or EDR solution. Use a dedicated rootkit scanner to check for hidden files or alternate data streams.
  2. Process and Service Validation: Confirm the malicious process no longer appears in the process list, even after a full system reboot. Verify that no new suspicious services or scheduled tasks have been recreated.
  3. Registry Confirmation: Re-check the autostart registry keys and any other locations where malware entries were found to ensure they have not been restored.
  4. Network Traffic Monitoring: Before reconnecting the host to the production network, monitor its outbound traffic in an isolated test environment for at least 30-60 minutes. Use a network monitoring tool to look for any residual beaconing attempts or connections to known-bad IPs/domains associated with AsyncRAT. No unexpected outbound connections should exist.
  5. Log Analysis: Review Windows Event Logs (especially Security, System, and Application) for errors related to the deleted files or services failing to start. This can confirm the persistence mechanisms are broken. Ingest these logs into your SIEM platform and search for any remaining indicators.

Post-Removal Security Hardening

Prevent reinfection by addressing the initial attack vector and improving defenses.

  1. Vector Analysis & Closure: Determine the initial infection vector (e.g., malicious email attachment, drive-by download, exploited vulnerability). Implement blocking rules at the email gateway, web filter, or firewall to prevent recurrence from the same source.
  2. Endpoint Configuration:
    • Application Whitelisting: Implement a policy to allow only authorized, signed executables to run from user-writable directories like %AppData% and %Temp%.
    • Enhanced Monitoring: Configure your EDR solution to alert on process creation from explorer.exe for non-browser applications, outbound connections on non-standard ports from user-space processes, and writes to critical registry autostart keys.
    • Least Privilege: Ensure standard user accounts do not have administrative privileges. Use dedicated admin accounts for elevation.
  3. Network Defenses:
    • Update firewall and proxy rules to block traffic to the known AsyncRAT C2 servers and IPs from the IOC list.
    • Deploy network intrusion detection rules to flag traffic patterns matching AsyncRAT’s beaconing or data exfiltration signatures.
  4. Policy and Awareness:
    • Update incident response playbooks to include the specific indicators and containment steps for AsyncRAT.
    • Conduct user awareness training focused on the identified initial vector (e.g., phishing recognition, safe browsing).
  5. Continuous Validation: Schedule periodic reviews of the remediated system for the first week post-cleanup. Ensure your SIEM has correlation searches set up to detect any resurgence of the specific IOCs associated with the incident.

For the most current technical indicators, please refer to the Current AsyncRAT IOCs. To understand typical detection efficacy, review the Detection Rate. For general background on this threat, see the AsyncRAT Overview.