user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:MSIL/AsyncRAT!atmn
Trojan:MSIL/AsyncRAT!atmn - Windows Defender threat signature analysis

Trojan:MSIL/AsyncRAT!atmn - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:MSIL/AsyncRAT!atmn
Classification:
Type:Trojan
Platform:MSIL
Family:AsyncRAT
Detection Type:Concrete
Known malware family with identified signatures
Suffix:!atmn
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for .NET (Microsoft Intermediate Language) platform, family AsyncRAT

Summary:

This is a concrete detection of AsyncRAT, a .NET-based Remote Access Trojan (RAT). The malware establishes persistence via the registry, communicates with a command-and-control server (188.227.57.46) to execute commands and download additional payloads, and uses obfuscation and anti-analysis techniques to evade detection.

Severity:
Critical
VDM Static Detection:
Relevant strings associated with this threat:
 - SbieDll.dll (PEHSTR_EXT)
 - \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS (PEHSTR_EXT)
 - Plugin.Plugin (PEHSTR_EXT)
 - nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS (PEHSTR_EXT)
 - cmd.exe /c ping 0 -n 2 & del (PEHSTR_EXT)
 - CompressionMode (PEHSTR_EXT)
 - HttpDownloadFile (PEHSTR_EXT)
 - get_ExecutablePath (PEHSTR_EXT)
 - 188.227.57.46/folder/core_Hvovthzn.jpg (PEHSTR_EXT)
 - Hadgbbpi.Tynwpfgdqqzvie (PEHSTR_EXT)
 - uu.exe (PEHSTR_EXT)
 - Execute (PEHSTR_EXT)
 - Xub.Form1.resources (PEHSTR_EXT)
 - ConfuserEx v1.0.0 (PEHSTR_EXT)
 - dPqLCOBUxlULbXCvCT.BampERXWdA9jWLsito (PEHSTR_EXT)
 - nVF9ahaPwEAA3Eecev.PwSxkyla6Vn3H8imOI (PEHSTR_EXT)
 - cizbckj.Resources (PEHSTR_EXT)
 - RayCry5.2 (PEHSTR_EXT)
 - v4.My.Resources (PEHSTR_EXT)
 - cuckoomon.dll (PEHSTR_EXT)
 - SxIn.dll (PEHSTR_EXT)
 - cmdvrt32.dll (PEHSTR_EXT)
 - nolane.Resources.resources (PEHSTR_EXT)
 - AsyncRAT-Client.exe (PEHSTR_EXT)
 - WindowsApp1.g.resources (PEHSTR_EXT)
 - 007Stub.g.resources (PEHSTR_EXT)
 - 007Stub.Properties.Resources (PEHSTR_EXT)
 - Kanhal.Properties (PEHSTR_EXT)
 - AsyncRAT (PEHSTR_EXT)
 - dbxqlcuy.Resources (PEHSTR_EXT)
 - duukukfdcyeffdtm.Resources (PEHSTR_EXT)
 - B0B0B0B0/ (PEHSTR_EXT)
 - jpeeQ0IwxWktqBxo7a.m0isIZ1u0duW28n3D5 (PEHSTR_EXT)
 - kSmnWlJPHFVQDBjd1A.TvcOJ1GnlFaOE2lTvU (PEHSTR_EXT)
 - SelenaGomez.Program (PEHSTR_EXT)
 - Windo.Resources (PEHSTR_EXT)
 - ReD_Security.resources (PEHSTR_EXT)
 - <t.me/GhostHackersNetwork> (PEHSTR_EXT)
 - ://172.86.96.111:8080/Script.ps1 (PEHSTR_EXT)
 - powershell -ExecutionPolicy Bypass -File $localPath (PEHSTR_EXT)
 - /c schtasks /create /f /sc onlogon /rl highest /tn (PEHSTR_EXT)
 - masterKey can not be null or empty. (PEHSTR_EXT)
 - erp_proje.pdb (PEHSTR_EXT)
 - KoiVM.Runtime (PEHSTR_EXT)
 - BBbH.g.resources (PEHSTR_EXT)
 - server.Resources.resources (PEHSTR_EXT)
 - Tiffy.Td9ny.resources (PEHSTR_EXT)
 - Patrick_Crypter_Stub.Form1.resou (PEHSTR_EXT)
 - TripleDESCryptoServiceProvider (PEHSTR_EXT)
 - Client.Modules.Keylogger (PEHSTR)
 - Client.Modules.Clipper (PEHSTR)
 - .Targets.Browsers (PEHSTR)
 - Passwords.Targets.System (PEHSTR)
 - Advanced_Calculator.Properties.Resources.resources (PEHSTR_EXT)
 - kbakc.exe (PEHSTR_EXT)
 - cmd.exe /c curl -o %temp%\ (PEHSTR_EXT)
 - powershell start -WindowStyle hidden %temp%\ (PEHSTR_EXT)
 - Mains.My.Resources (PEHSTR_EXT)
 - C:\Users\Public\main (PEHSTR_EXT)
 - .exe (PEHSTR_EXT)
 - /main (PEHSTR_EXT)
 - hxca.exe (PEHSTR_EXT)
 - Net.exe (PEHSTR_EXT)
 - vtkntsybummgbuek.Resources (PEHSTR_EXT)
 - rkxkkflfzhejxsp.Resources (PEHSTR_EXT)
 - Services.exe (PEHSTR_EXT)
 - ProcessHacker.exe (PEHSTR_EXT)
 - exe.rekcaHssecorP (PEHSTR_EXT)
 - injector.exe (PEHSTR_EXT)
 - AsyncRAT 0.4 (PEHSTR_EXT)
 - dqqitdai.b0p (PEHSTR_EXT)
 - /C choice /C Y /N /D Y /T 1 & Del (PEHSTR_EXT)
 - ^l'y/ (SNID)
 - C:\windows\temp\Client1.bin (PEHSTR_EXT)
 - Apollo Justice Script Editor (PEHSTR_EXT)
 - AsyncClient.exe (PEHSTR_EXT)
 - nnn.exe (PEHSTR_EXT)
 - schtasks /Create /SC MINUTE /MO 15 /TN (PEHSTR_EXT)
 - MyLoader.bat (PEHSTR_EXT)
 - CollapseCheck_protectedv.exe (PEHSTR_EXT)
 - C:\Path\To\YourApp.exe (PEHSTR_EXT)
 - cw.rowlqig.cn (PEHSTR_EXT)
 - Users\Public\Downloads\%s (PEHSTR_EXT)
 - Microsoft.VisualBasic.Devices (PEHSTR_EXT)
 - ClientAny.exe (PEHSTR_EXT)
 - /c schtasks /create /f /sc onlogon /ru system /rl highest /tn (PEHSTR_EXT)
 - EmptyClean.exe (PEHSTR)
 - AsyncRAT | Disbale Defender (PEHSTR_EXT)
 - Plugins\Wallets.dll (PEHSTR_EXT)
 - Cmd / Powershell (PEHSTR_EXT)
 - HKEY_CURRENT_USER\SOFTWARE\AsyncRAT (PEHSTR_EXT)
 - //127.0.0.1/payload.exe (PEHSTR_EXT)
 - KDF62DFJFJFF26J.bat (PEHSTR_EXT)
 - taskkill /F /im svchost.exe (PEHSTR_EXT)
 - \DiscordNukeBot\x64\Release\1.pdb (PEHSTR_EXT)
 - \sharescreen\x64\Release\sharescreen.pdb (PEHSTR_EXT)
 - /hatthgola.vmp.dll (PEHSTR_EXT)
 - 7>\+D7r4(qHc@3w95'Dd)gutJ$.resources (PEHSTR_EXT)
 - GetExecutingAssembly (PEHSTR_EXT)
 - ttp://139.162.22.35/1.bat (MACROHSTR_EXT)
 - .resources (PEHSTR_EXT)
 - TournamentTrackerUI.DashBoard.resources (PEHSTR_EXT)
 - RatDownload\x64\Release\RatLoader.pdb (PEHSTR_EXT)
 - download/Realease (PEHSTR_EXT)
 - xspymain.github.io (PEHSTR_EXT)
 - AsyncClient.g.resources (PEHSTR_EXT)
 - Stub.exe (PEHSTR_EXT)
 - coposProject.forgotpasswordForm.resources (PEHSTR_EXT)
 - coposProject.statisticsForm.resources (PEHSTR_EXT)
 - coposProject.historyForm.resources (PEHSTR_EXT)
 - coposProject.startFormTwo.resources (PEHSTR_EXT)
 - coposProject.startFormThree.resources (PEHSTR_EXT)
 - coposProject.ucInventoryEmployee.resources (PEHSTR_EXT)
 - coposProject.ucSalesEmployee.resources (PEHSTR_EXT)
 - coposProject.ucSalesReceiptEmployee.resources (PEHSTR_EXT)
 - coposProject.ucReceiptPo.resources (PEHSTR_EXT)
 - coposProject.ucInventory.resourcesd (PEHSTR_EXT)
 - coposProject.userControl.purchaseOrderUc.resources (PEHSTR_EXT)
 - Bookings_056_07.exe (PEHSTR_EXT)
 - Gyazo: Screen Uploader (PEHSTR_EXT)
 - http://144.172.116.121/uiu/Awuolavee.mp3 (PEHSTR_EXT)
 - \NjRat (PEHSTR_EXT)
 - CCCCCCCCCCCCCCCCCCCCCCCCCCCC.Resources.resources (PEHSTR_EXT)
 - WindowsApp3jj.Resources.resource (PEHSTR_EXT)
 - D$v:\wiH (PEHSTR_EXT)
 - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
 - rundll32 (PEHSTR_EXT)
 - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
 - !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
 - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Known malware which is associated with this threat:
Filename: 1121212.exe
c7d57e221b4a2d6410c83b35d31d2d790dc5489dc82ec947807954f723d9a564
23/03/2026
Filename: dreamyware.exe
ddf39cc82dff3cd3cb7060d175e1bfe6b282be5165d0d7c2e3948389ff07ec26
23/03/2026
Filename: XWormClient.exe
5fa420c354822bc5427af0e7cb38d5bbae10610f71c26c7a53c2aa0ba036b71d
23/03/2026
Filename: XClient.exe
e14941788ae13f47e674ed11755a8f57370bbbef6c4a43369e1791e53e44d24b
23/03/2026
Filename: NitroGen2026.exe
4128be0ab78add387ead049f06dbdc31e371a04d0347fc9944c38c441297aeef
23/03/2026
Remediation Steps:
Immediately isolate the host from the network. Perform a full system scan to remove all malicious components. Block the C2 IP address (188.227.57.46) at the firewall and reset all user credentials associated with the compromised machine.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 01/12/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$