BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Snake

57
Global rank
84
Month rank
77 infographic chevron week
Week rank
1019
IOCs

Snake is a modular keylogger written in .NET. Adversaries use this malware to exfiltrate confidential data, such as keystrokes, screen captures, and login credentials.

Keylogger
Type
Ex-USSR
Origin
15 August, 2019
First seen
29 March, 2022
Last seen
Also known as
404 Keylogger
404KeyLogger
Snake Keylogger

How to analyze Snake with ANY.RUN

Type
Ex-USSR
Origin
15 August, 2019
First seen
29 March, 2022
Last seen

IOCs

IP addresses
31.210.74.53
Hashes
0d2ef182ac4396342e041aa0891c6dfa28eca25b49bb59546f8eaecfc2a389a8
553d3053ad2d794d4e2bf6674ac43549838ab6570b47d6e28ec594bd02ba4d8b
88d3a22719771245da0d502db579596a8e3f347d0a9af7decdd830a059c2d537
ff7f9acd0576f65a4b268ffcd7f3792968e8c5f63f3811b0715ad3db8489cee7
14c7331b5afeca593ff69250804ea1cffd8ccdbe2c0370e991eecbe87c6599b5
7a43e50091e1f6a5a80e4e3b2f246a067f94ff7e85067ee9f98e11225fbbfa9f
e6609ae5fb8180b336d2349a97518ff15ac1b7a60a022d5befd0a366040d2de4
f2369d2aca3f1900994867c63e9e1c0c9e4ba70285e81ac7df78bb456471637a
2f7fa88382210dc974ad20d7dd204655d5321cb220f7507bfbe57577c767d66a
16a49dc1d470290d3184a0fcc07a3ffcd1d77ea51ee0fd32cde6b8d06da53f21
3857fcbee4a5113f3be6d087d6c01d1b78383e1b5930b0549ec8bf78a8bb1fdb
1b3b303340bb9833237c005861315ef6f91532b063fa8c9f032e98eb216bd582
915c681cf24ce5aa5ac24cbe3d9fe1106966ff7467c16a3e7b002e80034da8c9
6c7cbf4b4eb2e90a7093cc03786942ca42c88c0cdd30397b1530530c7ad40ae9
bdc99cee198da48fe92f03ab3f6d2ce0d5385fcee0960d3cadf491f01b2354b8
e9535fd8be2d9c01b5ae58735c989f2a1c4a69dfdcd9dc12ee5fb3cb6b44169b
c901b86e7d9f3cd9b9c50533d67b0e95ab1bb154aa7d817b40af99b528d3dc58
ec7d100b0dadc5c38ecb39309a02e826bd167ad25a28f4cf8b0d8c52aeca7018
5ce253f3f108a5c897560d6139a2911b99fd57c603e88ffa5e057d75501161e3
090c4c45cf33e0c6ec59a1b61c2e9efb4326d6650b91e128bd741fc5881f51d7
Domains
mail.skyshine.com.my
smtp.privateemail.com
cp5ua.hyperhost.ua
mail.activeshipping.com
mail.stilltech.ro
mail.valleycountysar.org
mail.yezinsaat.com.tr
mail.nclanka.lk
mail.alfalahchemicals.com
mail.prinutrition.com
posta.ni.net.tr
smtp.azebal.com
mail.sienkakupeste.com
mail.anatolia-mountains.com
mail.eversafe.pt
mail.rockglen.com
mail.alroman.com
mail.karacainsaat.com.tr
mail.algodontekstil.com
mail.black-pepper.nl
Last Seen at

Recent blog posts

post image
How to Use Threat Intelligence Feeds
watchers 349
comments 0
post image
Tools and Technologies ANY.RUN Uses to Protec...
watchers 289
comments 0
post image
Release Notes: YARA Search, New Rules, Config...
watchers 973
comments 0

What is Snake malware

Snake is a modular infostealer and keylogger that was initially discovered in November 2020. Developed using the .Net programming language, it exhibits similarities with the AgentTesla, Formbook, and Matiex malware families, particularly in its staging mechanism.

Snake poses a significant risk to privacy due to its ability to exfiltrate a broad range of data. Its capabilities include:

  • Keyboard capturing
  • Clipboard hijacking
  • Credential theft
  • Screen recording

Snake is capable of stealing credentials from over 50 applications, including popular web browsers and file transfer clients, such as FileZilla. Notably, this malware is also able to steal wireless network profiles.

This keylogger is also notable due to its ability to exfiltrate that data through multiple protocols: FTP, SMTP, and Telegram.

Additionally, Snake collects system information including the hardware configuration, name, and operating system version of the infected machine.

Utilizing the system's IP address and date-time information, it identifies the geolocation of the machine it operates on. Some Snake samples, though not all, use this data to activate a kill switch. Such behavior is common for malware originating from the ex-USSR region, typically avoiding targets within nearby countries.

The threat of Snake infection is not confined to specific industries or geographical areas. According to some reports, it has the potential to infect all major platforms, including Windows, Linux, and more recently, MacOS. In addition, Snake is a highly popular malware — it often competes with AgentTesla for the top spot of various charts.

Snake is readily available as a Malware-as-a-Service on underground forums, with pricing options that range from 25 to 500 USD.

This infostealer comes equipped with anti-evasion capabilities. In some samples, its downloader component was found to sleep for a period of time to evade automatic sandboxes. It can also terminate processes related to AV and network analysis tools, such as Avast and Wireshark.

Upon completing the initial process, Snake secures its persistence by duplicating itself into the AppData folder under a random name, generating a scheduled task configuration within a temporary directory, and initiating a scheduled task. What’s more, it possesses the ability to self-delete from the system post data exfiltration, employing a deletion command with a 3-second timer.

Snake keylogger execution process

As a typical stealer, Snake keylogger doesn't produce a lot of noticeable activity, which makes its detection potentially tricky. However, once it's established on an infected machine, it may increase its activity — capturing more data and sending it to the command-and-control server.

In the majority of Snake versions, a single process is responsible for all malicious activities, which include stealing data from the compromised system. In the specific sample of Snake we've analyzed, this process was identified as arinzehfkd685371.exe.

snake keylogger main process

arinzehfkd685371.exe process details

The Snake malware uses a variety of tactics and techniques, as illustrated in the Mitre ATT&CK Matrix. Key strategies include:

  • exploiting client vulnerabilities for initial access
  • extracting credentials from files and password stores
  • querying the system registry
  • and collecting local emails.

It also uses tool transfers and mail protocols for command, control, and exfiltration purposes. Notably, a significant proportion of events (270) involved stealing credentials from files.

snake keylogger ATT&CK Matrix

The Mitre ATT&CK Matrix for Snake malware

During the analysis, ANY.RUN cloud interactive sandbox was able to retrieve Snake’s config automatically. The displayed configuration reveals the DES encryption key and the SMTP credentials used for data exfiltration.

snake keylogger configuration

Snake keylogger malware configuration

Network monitoring tools can use this SMTP information for detection, potentially flagging or blocking traffic associated with the host or email addresses.

Read a detailed analysis of Snake Keylogger in our blog.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of Snake malware

As is common with Malware-as-a-Service families, Snake is distributed through mass email phishing campaigns and targeted spearphishing. It is known to arrive via infected Microsoft Office documents or PDFs, typically embedded in payment-related messages.

Upon the user extracting the executable, it proceeds to decode and decrypt the base-64 payload, which is contained within a string variable.

Users are recommended to remain vigilant when downloading payment receipts or any documents from unfamiliar senders. Key signs of phishing attempts to look out for include poor grammar, manipulative messaging, and an unusually high number of typos for a professional email.

Snake malware conclusions

In closing, Snake is a powerful infostealer and keylogger that targets various industries and platforms, capable of extracting a wide range of data. Its sandbox evasion capabilities only add to the challenge of detection and analysis.

Try analyzing Snake in ANY.RUN. Create a free account using your business email to try out our interactive cloud malware sandbox.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy