Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Salat Malware Uses QUIC & WebSocket for Stealth Channels Stealthy
May 7, 2026
Phishing Attack: Event Invites Steal Your Login Credentials
May 7, 2026
FEMITBOT Network Pushes Crypto Fraud via Telegram Uses Mini
May 7, 2026
Home/Threats/Salat Malware Uses QUIC & WebSocket for Stealth Channels Stealthy
Threats

Salat Malware Uses QUIC & WebSocket for Stealth Channels Stealthy

Salat, a recently identified malware, is drawing significant concern within the cybersecurity community. Its sophisticated design and broad capabilities are notable. Developed in the Go programming...

Emy Elsamnoudy
Emy Elsamnoudy
May 7, 2026 4 Min Read
1 0

Salat, a recently identified malware, is drawing significant concern within the cybersecurity community. Its sophisticated design and broad capabilities are notable. Developed in the Go programming language, Salat functions as a full remote access trojan (RAT), providing attackers with deep, persistent control over infected systems.

Unlike simpler tools that focus on one task, Salat is engineered to do everything from stealing passwords to giving attackers live visibility into a victim’s screen and webcam.

What makes Salat particularly concerning is how it manages communication with its operators. It uses modern protocols, specifically QUIC and WebSocket, to blend its traffic into normal internet activity, making it much harder for security tools to flag anything suspicious.

The malware is designed not just to attack a target but to remain completely hidden while doing so, which sets it apart from most known threats.

Malware derives its first decryption key by applying an MD5 hash (Source - DarkAtlas)
Malware derives its first decryption key by applying an MD5 hash (Source – DarkAtlas)

Researchers from DarkAtlas identified and analyzed the malware in detail, publishing their findings on May 6, 2026. The team noted that Salat reflects careful and professional planning, including six different methods for concealing its internal strings and a system that generates a unique identity for each infected machine based on the device’s hostname and hardware profile.

Once inside a system, Salat begins collecting information right away. It gathers details about the operating system, CPU, GPU, memory, and the application the user currently has open. All of this is packaged and sent to the attacker’s server in encrypted form, giving them a full and detailed picture of the machine they now control.

The JSON is encrypted and POSTed to the C2 server (Source - DarkAtlas)
The JSON is encrypted and POSTed to the C2 server (Source – DarkAtlas)

The malware’s reach extends to browsers, cryptocurrency wallets, messaging applications, and clipboard contents. It can record keystrokes, take screenshots, stream the desktop live, and open a remote shell for direct command execution. Salat essentially hands full operational control of an infected machine to whoever is running it from the other side.

QUIC and WebSocket for Silent Communication

Salat is engineered to select the best available method for talking to its command server, and it strongly favors QUIC and WebSocket channels above all others.

These protocols are widely used by legitimate web services, which helps the malware’s traffic blend naturally into everyday network activity. Only if both are unavailable does it fall back to standard HTTP/2.

System Enumeration and Initial Beacon (Source - DarkAtlas)
System Enumeration and Initial Beacon (Source – DarkAtlas)

The addresses of its command servers are stored in a doubly encrypted format inside the binary, making them very difficult to extract during analysis. Once decoded, five separate server addresses were recovered, all sharing the same path structure. If the malware fails to connect after five consecutive attempts, it automatically rotates to the next server on its list.

What is especially notable is Salat’s backup plan using the TON blockchain. If every hardcoded server becomes unreachable, the malware queries the TON network through Cloudflare’s encrypted DNS service to retrieve a fresh server address. This makes the malware nearly impossible to fully cut off, since the blockchain itself cannot simply be taken offline.

Data Theft and Persistence on Infected Machines

Salat’s ability to steal data goes well beyond most malware tools. It targets saved passwords and cookies from Chromium and Firefox browsers, pulls tokens from Discord and Steam, and raids cryptocurrency wallet files. Everything collected is compressed into a ZIP archive before being sent out, keeping transfers small and harder to detect.

To survive reboots, Salat uses three separate persistence methods. It copies itself to a folder under a disguised name, such as explorer.exe or svchost.exe, and marks the file as hidden from view. It also creates a scheduled task that runs at every user login and repeats every 30 minutes, and it adds a registry key to launch itself each time Windows starts.

Security teams are advised to monitor for unusual outbound connections over QUIC or WebSocket protocols, especially to unfamiliar domains. Watching for hidden system files that share names with legitimate Windows processes is equally important.

Keeping endpoint tools updated to detect Go-based malware and auditing unknown scheduled tasks will significantly reduce the risk of a Salat infection going undetected.

Indicators of Compromise (IoCs):-

Type Indicator Description
SHA-256 25802493e7ef64523d6ab13ad6e5555b2b08fd4576ae2edd905ad939d256aa3a Salat malware sample hash
SHA-1 b8f4a8c2e7d1f3a9b5c6d8e0f1a2b3c4d5e6f7a8 Salat malware sample hash
MD5 25802493e7ef64523d6ab13ad6e5555b Salat malware sample hash
URL https://salator[.]es/sa1at/ Salat C2 server endpoint
URL https://wrat[.]in/sa1at/ Salat C2 server endpoint
URL https://websalat[.]top/sa1at/ Salat C2 server endpoint
URL https://salat[.]cn/sa1at/ Salat C2 server endpoint
URL https://wrat[.]in:992/sa1at/ Salat C2 server alternate port endpoint

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Phishing Attack: Event Invites Steal Your Login Credentials

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Taiwan HSR Hacked: Radio Spoofing Halts High Speed
May 6, 2026
Top Authors
Sarah simpson
Sarah simpson
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us