Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family SalatStealer
Trojan:Win32/SalatStealer!MTB is a concrete detection of a highly malicious information stealer designed to exfiltrate sensitive data. It employs sophisticated techniques including API hooking, screenshot capture, command execution, and leverages legitimate Windows binaries (like mshta, rundll32, regsvr32, PowerShell, and BITS) for persistence, evasion, and communication.
Relevant strings associated with this threat: - main.decryptData (PEHSTR_EXT) - shellCommand (PEHSTR_EXT) - sendScreen (PEHSTR_EXT) - salat/main (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
7357c0e5e671c1b58e30f35fbff27db438b858db65c4a7deb1f6dead2f7080785d346dd20bb2bcca16508edb45efbfe5776cd22672eedd15e67498c2a857ae01dec6935a711a10cf0cf9c7de77bc42ae1e0379fd4e863089e9624a4357da362fImmediately isolate the affected system. Verify Windows Defender has successfully quarantined or removed the threat and perform a full system scan. Due to the stealer functionality, reset all credentials (user accounts, web services, etc.) used on the compromised device. Investigate for persistence mechanisms, lateral movement, and potential data exfiltration. Consider re-imaging the system from a clean backup to ensure complete remediation.