Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

SalatStealer

168
Global rank
168
Month rank
168
Week rank
0
IOCs

SalatStealer, also known as WEB_RAT or Salat Stealer, is a Go-based information-stealing malware targeting Windows systems. It operates as a Malware-as-a-Service (MaaS) focusing on harvesting browser credentials, cryptocurrency wallets, and session data from popular applications like Telegram and Steam.

Stealer
Type
Unknown
Origin
1 August, 2025
First seen
Unknown
Last seen

How to analyze SalatStealer with ANY.RUN

Type
Unknown
Origin
1 August, 2025
First seen
Unknown
Last seen

IOCs

Recent blog posts

post image
German Manufacturing Under Phishing Attacks:...
watchers 938
comments 0
post image
CastleLoader Analysis: A Deep Dive into Steal...
watchers 3146
comments 0
post image
Integrating a Malware Sandbox into SOAR Workf...
watchers 897
comments 0

Beware SalatStealer – Stealthy Stealer Harvesting Browsers, Wallets, and Webcams

Key Takeaways

  1. SalatStealer is a Go-based Windows infostealer targeting browsers, crypto wallets, and app sessions.
  2. It uses advanced evasion like UPX packing, UAC bypass, and process masquerading.
  3. Distributed mainly via fake cracks and cheats on YouTube and forums.
  4. Persistence through registry keys and scheduled tasks ensures long-term access.
  5. Real-time surveillance features like webcam/microphone capture heighten privacy risks.
  6. Use TI Lookup to quickly check suspicious files, domains, or hashes for SalatStealer indicators.

destinationIP:"45.130.41.157".

IP detected as SalatStealer Suspicious IP detected as SalatStealer, plus targeted sectors

  1. Analyze threats interactively in ANY.RUN’s Sandbox to uncover SalatStealer’s full behavior and IOCs safely. View analysis

SalatStealer sample in Interactive Sandbox SalatStealer detonated in ANY.RUN’s Sandbox

What is SalatStealer Malware?

SalatStealer, also tracked as WEB_RAT, is a sophisticated information-stealing malware that targets Windows systems. First detected in August 2025, it has quickly established itself as a significant cybersecurity threat, combining extensive data theft capabilities with aggressive persistence mechanisms and real-time surveillance features.

What sets SalatStealer apart is its approach to data exfiltration. The malware doesn't just steal credentials. It harvests browser data, cryptocurrency wallets, messaging application sessions, system information, and even streams live video and audio from infected devices. Operating under a Malware-as-a-Service model, SalatStealer has become accessible to a broad range of cybercriminals, amplifying its reach and potential impact.

Written in Golang version 1.22.0, SalatStealer leverages the cross-platform capabilities and performance characteristics of the Go language. The developers have taken additional steps to hinder analysis by stripping all debugging symbols from the compiled binary, making reverse engineering significantly more challenging.

The malware employs multiple anti-analysis techniques, including virtual machine detection, mutex creation to prevent reinfection of the same device, and checks for debugging environments. These defensive measures help SalatStealer evade both automated sandbox analysis and manual reverse engineering attempts.

Upon execution, SalatStealer first checks if the infected system is connected to the internet by sending GET requests to specific URLs, automatically exiting if connectivity is not detected. This preliminary check ensures the malware operates only in environments where it can successfully communicate with its command-and-control infrastructure.

Often packed with UPX to increase entropy and hinder static analysis, the persistence mechanisms include registry run keys and scheduled tasks disguised as legitimate processes (e.g., Lightshot.exe or RuntimeBroker). It communicates with command-and-control (C2) servers via encrypted HTTPS channels and lightweight UDP beacons, using domains like salat[.]cn with multiple fallbacks for resilience. Operated through a web-based panel branded "WebRat," it is sold on underground forums for low subscription fees, making it accessible to a wide range of cybercriminals.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Salat Stealer Victimology

SalatStealer primarily targets opportunistic victims, such as individuals downloading pirated software, game cheats, or cracks from untrusted sources like YouTube links and file sharing sites. Its focus on cryptocurrency wallets and browser credentials suggests a strong interest in crypto enthusiasts and everyday users storing sensitive logins. While no specific geographic or sectoral targeting has been reported, the malware's broad capabilities make it a threat to both individual users and employees in organizations who fall for social engineering lures on personal devices.

How SalatStealer Threatens Businesses and Organizations

SalatStealer poses significant risks to business environments:

  • Credential compromise leads to account takeovers and lateral movement.

  • Exfiltrated session tokens can bypass multifactor protections.

  • Corporate browser credential theft exposes enterprise SSO and internal portals.

  • Cryptocurrency asset theft impacts any organization handling digital assets.

  • Long-term persistence creates opportunities for further exploitation and deeper intrusion.

  • Malware can undermine endpoint defenses by creating exclusion rules and disabling protective tools.

How SalatStealer Malware Gets in and Functions

Primary infection vectors include:

  • Phishing campaigns luring users to open malicious archives or executables.
  • Social engineering through cracked software, fake utilities, or rogue downloads.
  • Malicious advertisements or compromised websites serving infected files.
  • Bundling with trojanized installers.

The malware sample is packed using UPX version 0.89 or higher, with all sections in the PE file compressed or encrypted to hide the real program instructions. Upon execution, the malware unpacks itself in memory, revealing its true functionality while avoiding disk-based detection.

Before proceeding with malicious activities, SalatStealer verifies internet connectivity to ensure it can communicate with its command-and-control servers.

Salat initiates multiple processes and attempts to evade detection by disguising itself as a legitimate application, creating several child processes named Lightshot.exe, which are dropped into directories that appear to belong to trusted software.

To maintain persistence on infected systems, the malware creates multiple Run key entries in the Windows Registry, registering itself under different names (Lightshot, Procmon, and RuntimeBroker) to further evade detection by mimicking legitimate system or third-party processes. It utilizes Windows Task Scheduler to create scheduled tasks under deceptive names, each configured with multiple triggers.

A "Defender Excluder" script module quietly adds critical directories to Windows Defender's exclusion list, ensuring that neither the main payload nor its auxiliary tools are scanned.

The malware systematically enumerates and harvests data from multiple sources. It accesses browser SQLite databases to extract credentials, scans specific directories for cryptocurrency wallet files and configurations, monitors active windows to identify sensitive applications, and captures screenshots and video streams when appropriate.

It compresses collected data and exfiltrates it to command-and-control servers over the Quick UDP Internet Connections (QUIC) protocol.

The platform includes real-time WebSocket communication, remote PowerShell execution capabilities, and predefined scripts for Windows Defender exclusion manipulation, UAC disabling, and recovery environment disabling.

Sandbox Analysis of a SalatStealer Sample

ANY.RUN’s Interactive Sandbox overcomes Salat’s ant-detection and sandbox-evasion mechanics, exposing the full attack chain. For SalatStealer, the Sandbox can reveal unpacking routines, persistence mechanisms, network communications, and data exfiltration attempts.

View a SalatStealer sample analysis

SalatStealer Sandbox analysis SalatStealer detonated in the Interactive Sandbox

The main process spawns a child process lsass.exe. Domain resolution attempts for salat.cn were detected, but further network activity is absent due to the inactive C2 server.

Domain connection attempt Domain connection attempt

The sample is written in the Go language and packed with UPX which are detected by the Sandbox. It also reveals elliptic curves (YARA) that are used for encryption.

Malware features Malware features detected by the Sandbox

Registry queries extract basic data: computer name for victim identification, machine GUID for unique marking, and checking supported languages for locale adaptation. This forms a system profile, helping the malware select targets for data theft.

System data gathering System data gathering

The sample drops itself into trusted directories and masquerades under system names, making the process resemble built-in Windows components.

SalatStealer processes SalatStealer’s processes

Signing in the Task Scheduler ensures automatic launch. The malware creates tasks with multiple triggers: at user logon and a one-time launch at a specific time.

SalatStealer in Windows tasks SalatStealer in Windows tasks

Browser data exfiltration focuses on passwords, cookies, and sessions stored in databases like SQLite. Wallet extension IDs were detected for potential theft of funds, and functionality for stealing messenger data is also observed.

Credential harvesting and data theft Credential harvesting and data theft

Gathering Threat Intelligence on SalatStealer Malware

Threat intelligence services like ANY.RUN’s TI Lookup aggregate information about SalatStealer campaigns, including indicators of compromise, C2 infrastructure, file hashes, and tactics, techniques, and procedures. This intelligence enables proactive defense by allowing organizations to block known malicious infrastructure before infection attempts occur.

A threat name lookup can tell whether your business sector and geographical location are actively targeted by SalatStealer, deliver IOCs, and malware samples analyzed in the Sandbox:

threatName:"salat"

SalatStealer threat intelligence lookup data Use TI Lookup to gather salar Stealer IOCs and view sandbox analyses

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

SalatStealer represents a serious evolution in infostealer malware: resilient, stealthy, and offered under a MaaS model that lowers the barrier to entry for attackers. Its ability to extract credentials, wallets, and sessions combined with evasion and persistence tactics make it a formidable threat at both the individual and enterprise level. Detection depends on robust modern security tooling and threat intelligence, while prevention hinges on user training, hygiene, and proactive defenses.

Trial TI Lookup to start gathering actionable threat intelligence on the malware that threatens your business sector and region: just sign up to ANY.RUN.

HAVE A LOOK AT

Cerber screenshot
Cerber
cerber
Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss.
Read More
GuLoader screenshot
GuLoader
guloader
GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities.
Read More
Crocodilus screenshot
Crocodilus
crocodilus
Crocodilus is a highly sophisticated Android banking Trojan that emerged in March 2025, designed for full device takeover. Disguised as legitimate apps, it steals banking credentials, cryptocurrency wallet data, and enables remote control, rapidly evolving into a global threat targeting financial users across Europe, South America, and Asia.
Read More
Sality screenshot
Sality
sality
Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Gh0st RAT screenshot
Gh0st RAT
gh0st
Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.
Read More