Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    Navigating the labyrinth of forks

    July 23, 2025

    Splitgate 2 is yanked back to beta a month after release

    July 23, 2025

    OpenAI, Anthropic, Google may disrupt education market with new AI tools

    July 21, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»Navigating the labyrinth of forks
    Cyber Security

    Navigating the labyrinth of forks

    MichaBy MichaJuly 23, 2025No Comments10 Mins Read
    Navigating the labyrinth of forks


    The landscape of cyber security is constantly evolving, with new threats emerging and existing ones adapting at an alarming rate. Among these, AsyncRAT, a notorious open-source Remote Access Trojan (RAT), has cemented its place as a pervasive and adaptable piece of malware. Since its 2019 debut on GitHub, AsyncRAT has not only been widely adopted but has also spawned a sprawling network of forks and variants. This article delves into the origins and intricate evolution of AsyncRAT, offering unique insights into its diverse ecosystem and highlighting its significant impact on the modern threat landscape for those involved in malware analysis and defense.

    Understanding AsyncRAT: A Cornerstone of Cyber Threats

    AsyncRAT, short for asynchronous remote access trojan, emerged as an open-source project on GitHub in 2019, quickly gaining notoriety within the cybercrime community. Developed in C#, this versatile Remote Access Trojan (RAT) offers a comprehensive suite of malicious functionalities, including keylogging, screen capturing, and credential theft. Its accessibility and simplicity democratized sophisticated attack capabilities, making it an immediate favorite among cybercriminals and leading to its widespread deployment in various cyberattacks.

    While AsyncRAT was a complete rewrite, its roots can be traced back to the earlier Quasar RAT, available since 2015. Despite distinct codebases, a fundamental link exists in their custom cryptography classes—specifically, the Aes256 and Sha256 implementations used for decrypting malware configuration settings. As Figure 1 illustrates, identical code, including the same salt value and decryption settings, points to a clear influence. However, AsyncRAT distinguished itself with significant improvements, notably its modular architecture and enhanced stealth features, which made it more adaptable and resilient against detection in modern threat environments. This plugin-based architecture further propelled the proliferation of numerous forks, pushing the boundaries of its malicious capabilities.

    Navigating the AsyncRAT Fork Ecosystem

    Since its public release, AsyncRAT has served as a foundational framework for a multitude of new forks, each building upon or subtly altering its predecessor. This “fork labyrinth” encompasses variants ranging from mere cosmetic changes to substantial expansions in functionality.

    As depicted in Figure 2, a complex hierarchy of these derivatives has evolved. Our analysis identifies DcRat and VenomRAT as the most widely deployed variants, collectively responsible for a significant proportion of observed campaigns, as shown in Figure 3. These dominant forks, alongside a host of lesser-known ones, paint a dynamic picture of the AsyncRAT landscape.

    DcRat, for instance, represents a notable advancement over the original AsyncRAT. It leverages MessagePack for more efficient binary data serialization and incorporates sophisticated evasion techniques such as AMSI and ETW patching to disable security features that detect and log malicious behavior. DcRat also includes an antiprocess system to terminate security-related processes like Taskmgr.exe and MsMpEng.exe. Its plugin base is extensive, adding webcam access, microphone recording, Discord token theft, and even a simple ransomware plugin that uses AES-256 to encrypt files. Beyond these, subtle changes like altered salt values, dynamic API resolution, and deliberate variable renaming further enhance its stealth.

    VenomRAT, likely inspired by DcRat, is another feature-rich variant that stands almost as a separate threat. While its features are well-documented by other vendors, its strong resemblance in client-side mechanics groups it within the AsyncRAT family. It’s worth noting that not all forks are entirely serious; variants like SantaRAT or BoratRAT (see Figure 4) began as jokes, yet surprisingly, we’ve observed instances of their real-world deployment.

    Unmasking AsyncRAT Variants: Identification Techniques

    Accurate identification of AsyncRAT forks is crucial for effective threat intelligence and mitigation. Our research primarily focused on the client-side binary, which resides on victims’ machines and contains vital configuration details, including C&C server information. The most straightforward method involves inspecting the malware’s configuration, typically found in the InitializeSettings function. Encrypted with AES-256 and stored as base64 strings in the Settings class, the configuration often includes a “Version” field conveniently labeling the fork’s name or author’s pseudonym in approximately 90% of samples. For instance, Figure 5 illustrates the typical configuration initialization for VenomRAT.

    When the “Version” field is absent, another clue lies in the “Salt” value used for configuration encryption, often overlooked by attackers. This value, located in the Client.Algorithm.Aes256 class (see Figure 6), can reveal connections to parent forks. Additionally, the embedded certificate used for C&C server authentication, also a base64-encoded value in the configuration, can reveal further details like common name and organization, often tracing back to a previous fork (as shown in Figure 7 for BoratRAT).

    For more sophisticated cases, detailed analysis involves manually inspecting the code—comparing its structure, syntax, and functionality against known patterns. A more advanced method, explained in Axel Mahr’s blogpost, involves sending a specially crafted packet to the C&C server itself to identify the server’s AsyncRAT version.

    Deep Dive into Unique AsyncRAT Variants

    While major forks like DcRat dominate, several lesser-known variants showcase unique functionalities that push AsyncRAT’s capabilities further. These “exotic” forks, often the work of individual threat actors or small groups, comprise less than 1% of AsyncRAT samples but offer compelling insights into evolving attack vectors.

    NonEuclid RAT: This variant stands out for its diverse plugin ecosystem beyond standard functionalities (see Table 1). For example, WormUsb.dll is a potent malware spreader that compromises PE files on local drives and USBs. It relocates the original file, drops an obfuscated stub, and then decrypts/executes both the payload and original file upon execution. This highlights a critical, often underestimated, vector in modern cyber security: USB-borne malware remains a potent threat, especially in air-gapped or sensitive environments where it can facilitate initial access or lateral movement, as seen in past nation-state attacks like Stuxnet.

    Another notable plugin is cliper.dll, a dedicated clipboard hijacker that monitors for cryptocurrency wallet addresses and replaces them with the attacker’s own. This real-time interception of financial transactions exemplifies a direct pathway to financial fraud, a growing concern in cybercrime. Additionally, Brute.dll allows client-side brute-forcing of SSH and FTP, enabling attackers to distribute credential stuffing attacks across compromised machines.

    JasonRAT: Identified in 2024, JasonRAT uses obscure “satanic” variable-naming conventions and an extended Morse code for string obfuscation (Figure 14). Beyond typical AsyncRAT configurations (Figure 12), it extends client capabilities with country targeting.

    XieBroRAT: Characterized by Chinese localization, XieBroRAT introduces the BrowserGhost.dll plugin for browser credential theft and Abstain.dll for interaction with Cobalt Strike servers. It enhances coverage by wrapping the .NET client binary in shellcode, VBS, or JavaScript, and integrates well-known open-source tools like Mimikatz and SharpWifiGrabber for extended post-exploitation capabilities.

    The Evolving Landscape of Open-Source Malware

    The continued rise and evolution of AsyncRAT and its diverse forks unequivocally demonstrate the inherent risks associated with open-source malware frameworks. This ecosystem, ranging from persistent threats like DcRat to more curious, novelty forks like JasonRAT, illustrates how quickly threat actors can adapt, customize, and repurpose readily available code. The widespread availability of such frameworks significantly lowers the barrier to entry for aspiring cybercriminals, enabling even novices to deploy sophisticated malware with minimal effort.

    This “democratization of malware development,” especially considering the increasing potential for misuse of Large Language Models (LLMs) in generating malicious code, accelerates the creation and customization of malicious tools. The result is a rapidly expanding and increasingly complex threat landscape. For organizations, this underscores the critical importance of proactive detection strategies, moving beyond signature-based solutions to embrace deeper behavioral analysis and robust threat intelligence feeds to effectively address these continually emerging and evolving threats.

    For any inquiries about our research published on WeLiveSecurity, please contact us at threatintel@eset.com. 
    ESET Research offers private APT intelligence reports and data feeds. For any inquiries about this service, visit the ESET Threat Intelligence page.

    IoCs
    A comprehensive list of indicators of compromise (IoCs) can be found in our GitHub repository.

    Files

    SHA-1FilenameDetectionDescription
    F8E31B338123E38757F8B7099797119A038A3538Screamer.dllMSIL/AsyncRAT.CNonEuclid jump scare plugin.
    98223D2F8DF2F9E832AE081CD6E072A440C9A3CDPiano.dllMSIL/AsyncRAT.CNonEuclid audio player plugin.
    CDEC9A1C73E3E21B1D70DDAA6BF139D8D2A197A5Maps.dllMSIL/AsyncRAT.CNonEuclid geolocation plugin.
    932C49EEE087D432D0DA10CC0640B11FD2C91203Service.dllMSIL/AsyncRAT.CNonEuclid Windows service management plugin.
    2FA98D088486BAC57FF60E072E28FEE5830E7B28WormUsb.dllMSIL/AsyncRAT.CNonEuclid malware spreader plugin.
    62C9FEFA84067F695032A6939F07C3799AAD80A3Brute.dllMSIL/AsyncRAT.CNonEuclid SSH and FTP brute forcer plugin.
    FAD946F7ACF017F0C50C81BF379AABA3528AFBB3Signature Antivirus.dllMSIL/AsyncRAT.CNonEuclid signature-based file matcher plugin.
    51B8A5818B7031EDB59A2B2ECF160A78505880BAcliper.dllMSIL/AsyncRAT.CNonEuclid clipboard hijacker plugin.
    4FB0CAAD6E345947EE2D30E795B711F91C6A4819Stub.exeMSIL/AsyncRAT.AAsyncRAT client.
    FD9CF01CEA7DE8631C34B988A7AAD55587A162FAStub.exeMSIL/AsyncRAT.A3LoshRAT client.
    B8AB93E958E0DE4BE2766B2537832EDB37030429Client.exeMSIL/AsyncRAT.ADcRat client.
    68B58483D0E4E7CC2478D6B4FC00064ADE3D7DB3Microsoft_Edge_Driver.exeMSIL/AsyncRAT.AVenomRAT client.
    4F69E0CE283D273B724CE107DF89F11C556A7A4EClient.exeMSIL/AsyncRAT.CBoratRAT client.
    E4F87568473536E35006D1BD4D4C26A8809F3F91Client.exeMSIL/AsyncRAT.AAnarchy Panel client.
    D10B8197732437E9BF840FEA46A30EFF62892A4EClient.exeMSIL/AsyncRAT.ACollapseRAT client.
    0DC28EA51F0D96E0D1BC78DF829C81A84332C5F1dwm.exeMSIL/AsyncRAT.AShadow X RAT client.
    E5B511E7550CBADE74E75EADE8F413A89D963FE5ClientAny.exeMSIL/AsyncRAT.ALMTeamRAT client.
    3124F58428184FDF75E21B1E5A58CADF9DD2BA03Stub.exeMSIL/AsyncRAT.APhoenixRAT client.
    8402AA507CF5B1BBFAB53E3BF7A7D4500796A978Client.exeMSIL/AsyncRAT.AEchoRAT client.
    AB2C6F9695346FAA9495B4AB837085C1524FFDDFClient.exeMSIL/AsyncRAT.AXieBroRAT client.
    3E6CD9D07B8ECE706697F332AC9F32DE5ECAF086tempClient.exeMSIL/AsyncRAT.CNonEuclid RAT client.
    FF4592A8BCB58F5CF6BD70B882E886EC6906EECDServant.exeMSIL/AsyncRAT.AJasonRAT client.

    MITRE ATT&CK techniques
    This table was built using version 17 of the MITRE ATT&CK framework.

    TacticIDNameDescription
    Defense EvasionT1562.001Impair Defenses: Disable or Modify ToolsDcRat terminates security tools such as Taskmgr.exe and MsMpEng.exe.
    T1562.004Impair Defenses: Disable or Modify System FirewallDcRat leverages AMSI and ETW bypass techniques to evade detection.
    T1027.013Obfuscated Files or Information: Encrypted/Encoded FileJasonRAT employs modified Morse code and obscure variable names to hinder analysis.
    Credential AccessT1539Steal Web Session CookieDcRat leverages a plugin to steal Discord tokens from compromised machines.
    T1555.003Credentials from Password Stores: Credentials from Web BrowsersXieBroRAT uses a plugin to collect browser credentials.
    T1110.003Brute Force: Password SprayingNonEuclid uses a plugin to brute force SSH and FTP credentials.
    DiscoveryT1614.001System Location Discovery: System Language DiscoveryNonEuclid uses a plugin that collects geolocation data from compromised systems.
    CollectionT1123Audio CaptureDcRat has a microphone plugin that enables audio capture from the victim’s device.
    T1125Video CaptureDcRat includes a webcam plugin that allows remote access to the victim’s camera.
    T1115Clipboard DataNonEuclid uses a plugin that monitors the clipboard to intercept and replace cryptocurrency wallet addresses.
    ImpactT1486Data Encrypted for ImpactDcRat features a ransomware plugin capable of encrypting files on the victim’s system.

    FAQ

    Question 1: What is AsyncRAT and why is it so prevalent in cybercrime?

    Answer 1: AsyncRAT is an open-source Remote Access Trojan (RAT) developed in C#. Its prevalence stems from its simplicity, versatility, and accessible code, which significantly lowers the barrier for cybercriminals to deploy sophisticated malware. This “democratization” of malicious tools allows even less experienced actors to conduct complex cyberattacks, making it a persistent and adaptable threat in the cyber security landscape.

    Question 2: How do AsyncRAT’s forks evolve, and what unique threats do they pose?

    Answer 2: AsyncRAT’s forks evolve by extending its original capabilities, incorporating new features, advanced evasion techniques, and specialized plugins. These variants, such as DcRat or NonEuclid RAT, can include functionalities like ransomware, credential theft from browsers or Discord, and even USB-borne malware spreaders. This continuous evolution makes them highly adaptable and challenging to detect, posing a significant and dynamic threat to organizational and personal cyber security defenses.

    Question 3: What are key strategies for organizations to defend against sophisticated RATs like AsyncRAT and its variants?

    Answer 3: Effective defense against sophisticated RATs requires a multi-layered approach. Key strategies include implementing robust Endpoint Detection and Response (EDR) solutions, continuous network monitoring, regular patching and software updates, and comprehensive employee training on phishing and social engineering tactics. Additionally, organizations should leverage up-to-date threat intelligence feeds and prioritize behavioral analysis over traditional signature-based detection to identify novel or evasive malware variants. Given the threat of plugins like `WormUsb.dll`, strict USB device policies and endpoint scanning for removable media are also crucial.



    Read the original article

    0 Like this
    forks Labyrinth Navigating
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleSplitgate 2 is yanked back to beta a month after release

    Related Posts

    Cyber Security

    OpenAI, Anthropic, Google may disrupt education market with new AI tools

    July 21, 2025
    Cyber Security

    Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

    July 18, 2025
    Cyber Security

    AI Impact On Cybersecurity Jobs in 2025

    July 17, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.