cognitive cybersecurity intelligence

News and Analysis

Search

New Salat Malware Uses QUIC and WebSocket Channels for Stealthy Remote Control

New Salat Malware Uses QUIC and WebSocket Channels for Stealthy Remote Control

A newly identified malware called Salat is raising serious alarms across the cybersecurity community for its sophisticated design and surprisingly wide range of capabilities. Built using the Go programming language, it operates as a full remote access trojan, giving attackers deep and persistent access to any system it infects.

Unlike simpler tools that focus on one task, Salat is engineered to do everything from stealing passwords to giving attackers live visibility into a victim’s screen and webcam.

What makes Salat particularly concerning is how it manages communication with its operators. It uses modern protocols, specifically QUIC and WebSocket, to blend its traffic into normal internet activity, making it much harder for security tools to flag anything suspicious.

The malware is designed not just to attack a target but to remain completely hidden while doing so, which sets it apart from most known threats.

Malware derives its first decryption key by applying an MD5 hash (Source – DarkAtlas)

Researchers from DarkAtlas identified and analyzed the malware in detail, publishing their findings on May 6, 2026. The team noted that Salat reflects careful and professional planning, including six different methods for concealing its internal strings and a system that generates a unique identity for each infected machine based on the device’s hostname and hardware profile.

Once inside a system, Salat begins collecting information right away. It gathers details about the operating system, CPU, GPU, memory, and the application the user currently has open. All of this is packaged and sent to the attacker’s server in encrypted form, giving them a full and detailed picture of the machine they now control.

The JSON is encrypted and POSTed to the C2 server (Source – DarkAtlas)

The malware’s reach extends to browsers, cryptocurrency wallets, messaging applications, and clipboard contents. It can record keystrokes, take screenshots, stream the desktop live, and open a remote shell for direct command execution. Salat essentially hands full operational control of an infected machine to whoever is running it from the other side.

QUIC and WebSocket for Silent Communication

Salat is engineered to select the best available method for talking to its command server, and it strongly favors QUIC and WebSocket channels above all others.

These protocols are widely used by legitimate web services, which helps the malware’s traffic blend naturally into everyday network activity. Only if both are unavailable does it fall back to standard HTTP/2.

System Enumeration and Initial Beacon (Source – DarkAtlas)

The addresses of its command servers are stored in a doubly encrypted format inside the binary, making them very difficult to extract during analysis. Once decoded, five separate server addresses were recovered, all sharing the same path structure. If the malware fails to connect after five consecutive attempts, it automatically rotates to the next server on its list.

What is especially notable is Salat’s backup plan using the TON blockchain. If every hardcoded server becomes unreachable, the malware queries the TON network through Cloudflare’s encrypted DNS service to retrieve a fresh server address. This makes the malware nearly impossible to fully cut off, since the blockchain itself cannot simply be taken offline.

Data Theft and Persistence on Infected Machines

Salat’s ability to steal data goes well beyond most malware tools. It targets saved passwords and cookies from Chromium and Firefox browsers, pulls tokens from Discord and Steam, and raids cryptocurrency wallet files. Everything collected is compressed into a ZIP archive before being sent out, keeping transfers small and harder to detect.

To survive reboots, Salat uses three separate persistence methods. It copies itself to a folder under a disguised name, such as explorer.exe or svchost.exe, and marks the file as hidden from view. It also creates a scheduled task that runs at every user login and repeats every 30 minutes, and it adds a registry key to launch itself each time Windows starts.

Security teams are advised to monitor for unusual outbound connections over QUIC or WebSocket protocols, especially to unfamiliar domains. Watching for hidden system files that share names with legitimate Windows processes is equally important.

Keeping endpoint tools updated to detect Go-based malware and auditing unknown scheduled tasks will significantly reduce the risk of a Salat infection going undetected.

Indicators of Compromise (IoCs):-

TypeIndicatorDescriptionSHA-25625802493e7ef64523d6ab13ad6e5555b2b08fd4576ae2edd905ad939d256aa3aSalat malware sample hashSHA-1b8f4a8c2e7d1f3a9b5c6d8e0f1a2b3c4d5e6f7a8Salat malware sample hashMD525802493e7ef64523d6ab13ad6e5555bSalat malware sample hashURLhttps://salator[.]es/sa1at/Salat C2 server endpointURLhttps://wrat[.]in/sa1at/Salat C2 server endpointURLhttps://websalat[.]top/sa1at/Salat C2 server endpointURLhttps://salat[.]cn/sa1at/Salat C2 server endpointURLhttps://wrat[.]in:992/sa1at/Salat C2 server alternate port endpoint

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post New Salat Malware Uses QUIC and WebSocket Channels for Stealthy Remote Control appeared first on Cyber Security News.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts