AsyncRAT - Daily Threat Report

Friday, April 10, 2026

Daily Summary

AsyncRAT activity has surged dramatically, with 15 new samples detected, representing a 289% increase over the 7-day average of 4. This sharp rise indicates a significant new distribution campaign is underway. The campaign is supported by a substantial expansion of command-and-control infrastructure.

New Samples Detected

The new samples show a clear preference for scripting-based initial access, with VBS files (8) constituting the majority. Executables (4) and batch files (2) are also present, with a single PowerShell script. This mix suggests a multi-stage delivery chain designed to bypass application allow-listing by using trusted, native Windows scripting hosts.

Distribution Methods

The dominance of .vbs and .bat files points strongly to phishing campaigns delivering malicious attachments or links to script files. These scripts likely function as downloaders or droppers, retrieving the final AsyncRAT payload. The single .ps1 file may indicate a shift toward more fileless techniques within the broader campaign.

Detection Rate

Current vendor detection rates for these new samples are moderate. The heavy use of obfuscated scripts, which are trivial for threat actors to modify, creates a detection lag. The new .exe variants are likely packed or signed with stolen certificates, further reducing initial AV efficacy.

C2 Infrastructure

A massive influx of 100 new C2 servers was registered, far exceeding typical daily infrastructure churn. This scale suggests preparatory work for a high-volume campaign, providing resilience against takedowns. The servers are geographically dispersed, showing no clear pattern, which complicates blocking by region.

7-Day Trend

Today’s explosive activity breaks a period of relatively low, steady volume observed over the past week. This spike suggests the start of a coordinated, large-scale operation rather than sporadic, independent attacks.

Security Analysis

The current campaign’s high script-to-binary ratio is a notable deviation from earlier AsyncRAT campaigns, which more frequently used standalone malicious executables. This tactical shift prioritizes evasion over convenience. A key defensive recommendation is to enhance logging and monitoring for child processes spawned from wscript.exe, cscript.exe, and cmd.exe, particularly those that subsequently exhibit network connections to unfamiliar IPs, as this can identify the script-based download chain.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)