Threat Advisories:
Critical Threat Research : Middle-East at WAR: The Rapidly Escalating Iranian Cyber Threat Download the Report

AsyncRAT Behind the Cloudflare Curtain

Amber | Attack Report
Download PDF

Summary

A sophisticated AsyncRAT malware campaign commenced in 2026 targeting Windows systems worldwide through cloud-assisted intrusion techniques that abuse trusted services including Dropbox and Cloudflare. This AsyncRAT campaign demonstrates how modern threat actors seamlessly blend malicious activity into everyday digital routines, transforming ordinary invoice emails into full-scale system compromises through strategic abuse of legitimate cloud platforms. The AsyncRAT attack chain leverages Python-based scripts and native Windows tools to handle multi-stage payload execution while victims are deceived with legitimate-appearing PDF documents. The AsyncRAT malware establishes persistence through Windows Startup folders and injects malicious code directly into common system processes including explorer.exe. This stealthy cloud-assisted AsyncRAT intrusion favors patience and persistence over noisy exploitation techniques, underscoring how contemporary threats increasingly rely on trust exploitation, automation capabilities, and subtle deception rather than overt vulnerability exploitation. The AsyncRAT campaign highlights evolving attacker tradecraft that leverages WebDAV servers hosted behind Cloudflare’s free-tier infrastructure and Dropbox file hosting to mask malicious AsyncRAT traffic as legitimate cloud service communications, enabling effective evasion of security controls.

Attack Details

AsyncRAT Malware Capabilities and Deployment Strategy

AsyncRAT continues demonstrating its position as a widely abused remote access trojan, largely because the malware combines powerful surveillance capabilities with ease of deployment across Windows environments. Threat actors favor AsyncRAT for features including comprehensive keylogging, screen capture functionality, remote command execution capabilities, and modular design allowing operators to tailor AsyncRAT malware to specific operational needs. In this AsyncRAT campaign, Python played a central automation role throughout the infection chain, handling multiple stages of malicious execution. The AsyncRAT attack began with Windows Script Host files that pulled additional scripts from WebDAV servers hosted behind Cloudflare’s free-tier infrastructure, allowing malicious AsyncRAT traffic to blend seamlessly with legitimate cloud service communications and evade security scrutiny.

AsyncRAT Phishing and Initial Compromise Vector

The AsyncRAT compromise started with carefully crafted phishing emails luring victims into opening Dropbox-hosted Internet Shortcut (.url) files masquerading as legitimate invoice documents. These AsyncRAT shortcut files redirected users to multi-stage scripts delivered through TryCloudflare domains, initiating complex infection sequences. The AsyncRAT scripts systematically installed Python runtime environments, established persistence mechanisms via Windows Startup folders, and ultimately injected malicious code into explorer.exe processes. The final AsyncRAT payload delivery reflected relatively high technical sophistication and demonstrated clear focus on achieving long-term system control rather than opportunistic infection approaches common in less sophisticated malware campaigns.

AsyncRAT Infection Chain Using Native Windows Processes

Behind the scenes, the AsyncRAT infection chain relied heavily on native Windows processes and scripting capabilities to avoid detection. Windows services including svchost.exe activated WebClient service to communicate with AsyncRAT WebDAV servers, while rundll32.exe and Windows Script files orchestrated retrieval and execution of additional AsyncRAT payloads. The initial script component, as.wsh, fetched and launched anc.wsf, which downloaded and executed multiple batch files supporting AsyncRAT installation. One batch file silently installed Python environment necessary for AsyncRAT execution, while another displayed legitimate PDF documents to distract victims, effectively masking malicious AsyncRAT activity occurring in parallel system processes.

AsyncRAT Persistence and Payload Injection Techniques

Once Python was installed on compromised systems, AsyncRAT attackers focused on establishing persistence and executing final payload stages. Startup scripts ensured AsyncRAT malware survived system reboots, while Python-based loaders injected shellcode into explorer.exe using advanced techniques including asynchronous procedure call injection. The final AsyncRAT payload was delivered in encrypted binary form and decrypted at runtime using locally stored cryptographic keys. Additional folders and files on AsyncRAT command infrastructure suggest attackers maintained flexible toolkits capable of supporting multiple backdoors and infection scenarios beyond standard AsyncRAT deployment, illustrating how modern threat actors combine cloud services, scripting languages, and deceptive tactics to build resilient, stealthy AsyncRAT malware operations difficult to detect and disrupt.

Recommendations

Exercise Caution With Invoice-Themed Phishing Emails

Attackers frequently disguise AsyncRAT malware as invoices or order confirmations to trigger quick user clicks based on business urgency. Employees should pause before opening ZIP files or shortcuts in emails, especially when messages are unexpected or urge immediate action. When email authenticity is doubtful, verify senders through trusted communication channels before opening any AsyncRAT-laden attachments or links.

Block Internet Shortcut Files in Email Communications

Internet Shortcut (.url) files are rarely needed for legitimate business purposes and are increasingly abused by AsyncRAT threat actors. Organizations should block or restrict these file types at email gateways and educate users that legitimate PDF documents should never arrive as shortcut files. This simple control prevents initial AsyncRAT compromise through malicious shortcut files.

Limit Abuse of Built-In Windows Scripting Tools

This AsyncRAT attack relied extensively on native Windows tools including Windows Script Host, PowerShell, and batch files to maintain stealth during compromise. Organizations should restrict or monitor use of these scripting tools, especially on user systems that do not require scripting for daily operations. Enhanced monitoring of Windows scripting processes helps detect AsyncRAT infection attempts.

Monitor for Unusual Python Activity on User Endpoints

Installation of Python on Windows endpoints that do not typically utilize development tools represents a strong AsyncRAT infection indicator. Security teams should monitor for unexpected Python downloads, execution of python.exe processes, or scripts running at system startup. Detecting unusual Python activity enables early AsyncRAT infection identification before full compromise occurs.

Monitor Trusted Cloud Services for Suspicious Behavior Patterns

AsyncRAT threat actors increasingly abuse legitimate platforms including Cloudflare, Dropbox, and WebDAV to hide malicious traffic patterns. Network and endpoint monitoring should focus on identifying abnormal behavior patterns rather than assuming trusted cloud domains are always safe. Enhanced monitoring of cloud service communications helps detect AsyncRAT command-and-control channels hidden within legitimate traffic.

MITRE ATT&CK TTPs

Initial Access (TA0001)
  • T1566: Phishing – AsyncRAT phishing email campaigns
  • T1566.002: Spearphishing Link – Malicious links to AsyncRAT payloads
Execution (TA0002)
  • T1059: Command and Scripting Interpreter – Script-based AsyncRAT execution
  • T1059.001: PowerShell – PowerShell for AsyncRAT deployment
  • T1059.003: Windows Command Shell – Batch file execution
  • T1059.006: Python – Python-based AsyncRAT loaders
  • T1204: User Execution – User interaction triggering AsyncRAT
  • T1204.001: Malicious Link – User clicking AsyncRAT links
  • T1204.002: Malicious File – User opening AsyncRAT files
Persistence (TA0003)
  • T1547: Boot or Logon Autostart Execution – AsyncRAT persistence mechanisms
  • T1547.001: Registry Run Keys / Startup Folder – Startup folder persistence
Defense Evasion (TA0005)
  • T1027: Obfuscated Files or Information – AsyncRAT payload obfuscation
  • T1036: Masquerading – AsyncRAT disguised as legitimate files
  • T1036.007: Double File Extension – Deceptive file extensions
  • T1055: Process Injection – AsyncRAT injection into explorer.exe
  • T1218: System Binary Proxy Execution – Living-off-the-land techniques
  • T1218.011: Rundll32 – Rundll32.exe abuse for AsyncRAT
Collection (TA0009)
  • T1056: Input Capture – AsyncRAT keylogging capabilities
  • T1056.001: Keylogging – Keystroke capture functionality
Command and Control (TA0011)
  • T1102: Web Service – Abuse of Cloudflare and Dropbox
  • T1071: Application Layer Protocol – HTTP/HTTPS communications
  • T1071.001: Web Protocols – Web-based AsyncRAT C2
  • T1105: Ingress Tool Transfer – AsyncRAT payload downloads
  • T1573: Encrypted Channel – Encrypted AsyncRAT communications
Exfiltration (TA0010)
  • T1041: Exfiltration Over C2 Channel – Data exfiltration through AsyncRAT C2

Indicators of Compromise (IOCs)

SHA256 Hashes Associated with AsyncRAT Campaign
  • 3475330b22f8652e713311689085a5ec24d03ce68d229e43afe89ed2f05a4a01
  • 33696190e43ede407b1b4903b10cafda0e49376d8ce0c85f01197f7c5073bc04
  • e8abdc2f58bb7391eb541e4c06467f422549a79740a3a1ad2979d48595555400
  • af22cd07ebfcba8d457a1bfacee7b66c60846de1b1d7ab356398dac696984ced
  • 41a01b6f2c4dc340cf35fab38c732e5d2660bedb15e3912d9970d724e20b4f71
  • 403784357e6402433153d47c2362f26cc26e135a1305393cea074574d3027af5
  • 47fe42924e00e92e3b297426a8ce3aa39864fbf6e7ae65893b4f5dbe0ea8176c
  • 0948683788167caec8ec5552b88cf66e3c0a5c6d99b3843317f5c794400b401f
  • 201c4c502678c41ba2dbb196cfe0f9f61371c10fdf947f1682eff8202f4ce580
  • 0aa3250cfb6d7defc68d6d7ddfbdee05a2329a20d944e8d4bb0e6b7f5a85caee
  • f3564370f1b243ca0bb6b31afe8f4bb11c35218e340dba94d4481218385be277
  • 7600f3d353aa29512dfc0cbc4aa0481453c078692174384a8da668ff1c6bd65a
  • b1032815b078aad59eb3bd32c29dee4621b37e516e679e84cb7d1c11c3eaff15
  • 4a75881d1ea48ae165ab7069dbfe398882d982e6a860c29ed1d940c4f285c871
  • e6cdcf2cdd49ac3ca256f30a7b5d11a9953748b5820b73845afcd7f9439d6290
  • 9e3a9db6942f7c42da4c53b5294604b232354002cee16f554a82edb1cf69c82f
  • 667d8cbd146c7e4c6dc674ff4219d3a7e682d6464e777a107e6207a7070bf626
  • D035d396ae5cda562d4e674b66eeda52a55510fe5c1d379930bff5bfcce10f13
Filenames Associated with AsyncRAT Campaign

ne.py, Rechnung zu Auftrag W19248960825.pdf.url, myfile.tar, we.html, new.html, vio.bat, xeno.bat, ahke.bat, olsm.bat, anc.wsf, wa.wsh, as.wsh, Rechnung_2025_10_33828247000801.pdf.lnk, ow/new.bin, new.bin, ab/new.bin, DATEV-Rechnung Nr.53511122025.pdf.zip, LEXWARE0019.pdf.url

Domains Used in AsyncRAT Campaign

owners-insertion-rentals-pursuit[.]trycloudflare[.]com, plus-condos-thy-redeem[.]trycloudflare[.]com, citysearch-packed-bacterial-receptors[.]trycloudflare[.]com, strength-blind-bristol-ten[.]trycloudflare[.]com, syracuse-seeks-wilson-row.trycloudflare[.]com, license-appointed-asset-pulled[.]trycloudflare[.]com, pie-references-chart-ozone[.]trycloudflare[.]com

IP Addresses Associated with AsyncRAT Infrastructure
  • 43[.]157[.]118[.]169
  • 158[.]94[.]209[.]23
URLs Distributing AsyncRAT Malware
  • hxxp://dl[.]dropboxusercontent[.]com/scl/fi/50mvsqpvyxid7m39g773l/Rechnung-zu-AuftragW19248960825.pdf.zip?rlkey=rtgatrazvz9rbqtxbj9rtf7os&st=t318uel6&dl=0
  • hxxps://dl[.]dropboxusercontent[.]com/scl/fi/5uvu1977pm1v8e5w9dujx/LEXWARE0019.pdf.zip?rlkey=n9y56p52jbsgujjk84pnvdrrf&st=fqekaosq&dl=0

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox