
Severity
Medium
Analysis Summary
Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware's main feature is keylogging, but it also has additional capabilities such as taking screenshots and extracting data from the clipboard. Snake can also extract and exfiltrate data from browsers and email clients. The Snake Keylogger malware is typically delivered to target systems via malicious email attachments, infected software downloads, or drive-by downloads. Once installed on a system, the malware operates in the background and collects information as the user interacts with their computer. The collected data is then transmitted to the attacker, allowing them to access sensitive information.
Snake’s name was derived from strings found in its log files and string obfuscation code. Using the malware’s builder, a threat actor can select and configure desired features and then generate new payloads. For this reason, the capabilities of samples found in the wild can vary.
To protect against snake keyloggers, it is important to use antivirus software and keep it up to date. It is also important to be cautious when opening email attachments or downloading software from unknown sources. Additionally, using strong and unique passwords for all accounts can make it more difficult for a keylogger to obtain sensitive information.
Impact
- Credential Theft
Indicators of Compromise
MD5
899d2b8ff826322726411c11e2f2cb37
14246ea59962956247cb757ff4c485e8
83050104bb90edac542d79e85804c457
71bd2f038e92ae0e3b95a7567511458e
06c48ef3e45a7dafedbd596368918830
SHA-256
16d02da91883c9a647366f32cc807a6254349c3a19661493436eac67e46471cb
f89d5db1d93b61d6e6346fa86e914a5b02e927c8eee905e658b0818f76a545ca
4dcd586650a966fdcfd3259fbc5a7cc291bc6bfa86300975eba687dead7cdbf3
13ba4ee3d7accddd8dbce8e4bc4a623e0b7bf30350fe9d58f1c269cd744bb835
1e2333cb4fb3ecca06d22bb3b6255e5ac62b7ba43c3bceb8c17252657f34ba1e
SHA1
98ed5384de8a7fd68fa7d55fdd6997b9c102d615
41233827e40eacdc99a408d0b0ecfe78ee24120c
da8f36787211711c57a9d2cee3866f4cc8e77173
816293b2472e394288fc9c91bdff206ab8ef52e2
6ec2e82db6d702ddc0f4b302a4d8f02fd4c36c36
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open " links and attachments received from unknown sources/senders.
- Passwords - Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Admin Access - limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.