Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family SalatStealer
Trojan:Win64/SalatStealer!MTB is a sophisticated information-stealing Trojan detected by Windows Defender using machine learning behavioral analysis. It exfiltrates sensitive data by leveraging screen capture, API hooking, and remote file transfer, while utilizing legitimate system tools like mshta, rundll32, and PowerShell for execution, persistence, and evasion.
Relevant strings associated with this threat: - main.decryptData (PEHSTR_EXT) - shellCommand (PEHSTR_EXT) - sendScreen (PEHSTR_EXT) - salat/main (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
10ac444998acbf7df61a27205e104023d3722b4db77bc2ca3bac37b887d9998bImmediately isolate the infected system and perform a full scan with updated antivirus/EDR to remove all malicious files. Reset all potentially compromised credentials, especially those used in browsers, email, and other sensitive applications. Implement application control and monitor network traffic for further suspicious activity or exfiltration attempts.