AsyncRAT: Config Decryption Techniques and Salt Analysis

About the Newsletter

Join 100+ subscribers who get 0x1 actionable security bit every week.

In this article, we dive into the inner workings of AsyncRAT. This Remote Access Trojan (RAT) has seen a staggering 20% surge in its activity during the last quarter, as reported by the Spamhaus report.

We’ll explore diverse decryption methods for the AsyncRAT configuration and explore the AES Salts used in various files.

What is AsyncRAT?

AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions.  (Source: Malpedia)

Delivery Methods: How Malware Spreads

Spear-phishing, malvertising, exploit kit, and other techniques serve as delivery methods for this malware.

AsyncRAT Config Decryption via Static Extractors

Let’s dig deeper into decrypting the AsyncRAT configuration with static extractors like CyberChef Recipe and Python script.

Decryption Code for AsyncRAT
Decryption Code for AsyncRAT
CyberChef Recipe

One of the most efficient ways to decode the AsyncRAT config is by using the CyberChef Recipe developed by Srujan Kumar. I have made few modifications to existing recipe which support new AsyncRAT files.

The updated recipe, available on GitHub, works by decoding the AsyncRAT config. You need the code, salt, and variable name that stores the AES key. My research suggests that the current AsyncRAT samples predominantly use two salts.

For a step-by-step guide to use CyberChef to decrypt the AsyncRAT, check this article.

Python Script

Abdallah Elnoty has developed a small python script to decode the config. You can find all the details in this article (Feb 2022).

Dynamic Approach: Reflection in PowerShell

For those who prefer a more dynamic approach, @vinopaljiri has shared an innovative technique for config decoding. This method involves using reflection and PowerShell to load the binary and then invoke the InitializeSettings method, providing a quick and efficient approach. You can find more details here.

AsyncRAT Analysis: AES Salt

In my analysis of approximately 10-20 files, , I encountered only two distinct salts for AsyncRAT. You can find more details on my Github page.

AsyncRAT Salt list with hashes
AsyncRAT Salt list with hashes
Salt 1: bfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941 (Format: HEX)

This salt is referenced in the AsyncRAT source code available on Github (Last commit: May 10, 2020). It is also utilized in Quasar RAT 1.3, as indicated in the QuasarRAT-Analysis from December 1, 2020.

Salt 2: DcRatByqwqdanchun (Format: UTF8)

This salt is also used by DcRat malware (First commit: Mar 20, 2021).

Conclusion

These techniques are still effective on unpacked files, with some minor modifications. In the next blog post, we will delve deeper into CyberChef recipe and dynamic approach. Stay tuned!

Thanks for reading. Feel free to connect with me on or LinkedIn for any suggestions or comments.

For more updates and exclusive content, subscribe to our newsletter. Happy Reversing! 😊

Join 100+ subscribers who get 0x1 actionable security bit every week.




1 Comment. Leave new

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Related Posts

keyboard_arrow_up