

Rewterz Threat Alert – Amadey Botnet – Active IOCs
November 14, 2022
Rewterz Threat Alert – An Emerging Heodo Malware – Active IOCs
November 14, 2022
Rewterz Threat Alert – Amadey Botnet – Active IOCs
November 14, 2022
Rewterz Threat Alert – An Emerging Heodo Malware – Active IOCs
November 14, 2022Severity
Medium
Analysis Summary
Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it also has additional capabilities such as taking screenshots and extracting data from the clipboard. Snake can also extract and exfiltrate data from browsers and email clients.
Snake’s name was derived from strings found in its log files and string obfuscation code. Using the malware’s builder, a threat actor can select and configure desired features and then generate new payloads. For this reason, the capabilities of samples found in the wild can vary.
Impact
- Credential Theft
Indicators of Compromise
MD5
- f41ef066384697b9536cb2a2ceb52597
- 10ae1862cfa41f8b95ed0516757bcca9
- 83744e46b9ad605b1ae1c5c5d111a044
- 4e6a0d78565b0917b5871785218848fa
- a7c08e7f65b211c86e71b0a722f5a99e
SHA-256
- ec0be7b7b2dc0a162eee2673bb94370a8b7eef222856ceeed9126f123050d1fb
- bf3d593e6c12541ff7c42c1398fd7d8223502cb019f9d8196f2429d86f1eb092
- 5480378c2819bdca7cdad9efefa8ecc5d7060dd40fa32c6c5541100633d4e8ba
- 0f11dbfcf54ae858d3ea4c0e55024bf6970dda07577d06ee0340e55a4cfaf2e7
- 93efea0105183d17343bfbc418414d76c18c3fb9534a9898a8a43bfc65e20d55
SHA-1
- 1a67aae992f751da11f38216c7acc21d49baaa50
- cacc4c396294a5c2e4c1bd2d2f92d20a35eedb14
- 3a71dcb58a34ba9cae4f5e6e7cf9d68f33a51f9b
- f8cd7af4dcf4ddef614e95b7820d65fe37e2b337
- f43d68fdee7e57611b51a933ffe5f10ef4b486d5
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment