Snake

30
Global rank
56
Month rank
55
Week rank
4251
IOCs

Snake is a modular keylogger written in .NET. Adversaries use this malware to exfiltrate confidential data, such as keystrokes, screen captures, and login credentials.

Infostealer
Type
Ex-USSR
Origin
15 August, 2019
First seen
29 March, 2022
Last seen
Also known as
404 Keylogger
404KeyLogger
Snake Keylogger

How to analyze Snake with ANY.RUN

Infostealer
Type
Ex-USSR
Origin
15 August, 2019
First seen
29 March, 2022
Last seen

IOCs

IP addresses
193.70.18.144
132.226.247.73
162.213.253.52
27.254.86.43
74.208.5.15
198.50.154.144
85.187.128.34
158.101.44.242
193.122.130.0
193.122.6.168
132.226.8.169
198.12.123.178
185.85.204.185
162.222.226.133
88.99.90.21
162.241.252.77
104.219.248.46
198.54.126.118
162.241.148.243
31.31.198.198
Hashes
f328c0cde7df997ea2fd271bd3096b93f28fb6d93b06e5894209684b9f58873e
983c666a648fb57817c60b86c18a3ad671e246d7c6daabb16afffc36df5bee31
084376001d1f1b28426221b2b3647af27021f69eec9c65b383f2ad67307276da
4964afb5b817d12570ff89ed3173e565c7d646e99116cefc54b34141c90fb749
5faf5c84d97d707f189a84dccca5a0b8fa1eb7b29d6d5b55ae442c36fd036e4e
9dd7852b0af223e044c70870dc6691bf2fa26a35b738952c7f2c6a8049070d1e
075f9863f008b047005fada351f2e8f664d3896d40d3592427c0d3c420612302
05d5d64ae096e7663834b67eeb161657d419fb24b85ee439d80665dea5ee51a3
a00bc07c458a18926092123546c1c954596c2e602e64e277b5f3371adfecde8f
05eee1bc9c1e16edcc98e0db0f289834bf181636acf0a5cf79d4725a19b26e89
47a98390d2ac2a88d7853877e3c2f1d3253f90a0bb0f61b37570294e00a1107f
b2bb771a614c21fc44edd716d4c194efae9f63a63458ccc9b1554fee712acf2d
ce51c00676c4c64987ac61700f8f94c981cabcbcaaf8962185ccf6eaceb185bf
2a7cfe11b987ec96b626139ad0e633acd12b131907cd1d8ddf8b42013a53c4f6
dd08a8261b0e5e4c0684266c193df90d2f34cc6b259cbbf4e7685638aa118f42
3a23408a6f8cd5dafa396ef1a51ca0fa214684b7be2290df4e7b05293e9d9ffb
e59fbf01fe2ade6245736ab14a9ab1b29cf8f543b17da61ab3b0184724831614
726ee3a692f6c15c1f7223011f05b8c6efd3b418df0887f1a031c1fc97c302b1
aaa1238cff25c9609f089d345d805e5ea580e9e9cddfcdd640e446d0dfa3ad27
1d89428d461fe418e454be54a63ee6c27d61fe17b83286871ee18d1599dda156
Domains
vcctggqm3t.dattolocal.net
dubaioilandgas.xyz
eltem.iptime.org
elx01.knas.systems
njxyro.ddns.net
192-168-100-240.otmn.direct.quickconnect.to
192-168-100-240.otmn.direct.quickconnect.to
imp.ovh.net
ns0.ovh.net
frederikkempe.com
majul.com
device-local-3193b8ff-0889-41c5-8fd6-67066f88b277.remotewd.com
qxq.ddns.net
searchkn1.sima-land.ru
smtp.askinterior.co.in
smtp.all-tsc.com
smtp.delivr-it.com
smtp.talepparel.com
smtp.marintravellft.com
smtp.quartziax.com
Last Seen at

Recent blog posts

recentPost
How to Create a Task in ANY.RUN:a Step-by-Ste...
watchers 311
comments 0
recentPost
ChatGPT for SOC and Malware Analysis professi...
watchers 5388
comments 0
recentPost
Deobfuscating the Latest GuLoader: Automating...
watchers 3240
comments 3

What is Snake malware

Snake is a modular infostealer and keylogger that was initially discovered in November 2020. Developed using the .Net programming language, it exhibits similarities with the AgentTesla, Formbook, and Matiex malware families, particularly in its staging mechanism.

Snake poses a significant risk to privacy due to its ability to exfiltrate a broad range of data. Its capabilities include:

  • Keyboard capturing
  • Clipboard hijacking
  • Credential theft
  • Screen recording

Snake is capable of stealing credentials from over 50 applications, including popular web browsers and file transfer clients, such as FileZilla. Notably, this malware is also able to steal wireless network profiles.

This keylogger is also notable due to its ability to exfiltrate that data through multiple protocols: FTP, SMTP, and Telegram.

Additionally, Snake collects system information including the hardware configuration, name, and operating system version of the infected machine.

Utilizing the system's IP address and date-time information, it identifies the geolocation of the machine it operates on. Some Snake samples, though not all, use this data to activate a kill switch. Such behavior is common for malware originating from the ex-USSR region, typically avoiding targets within nearby countries.

The threat of Snake infection is not confined to specific industries or geographical areas. According to some reports, it has the potential to infect all major platforms, including Windows, Linux, and more recently, MacOS. In addition, Snake is a highly popular malware — it often competes with AgentTesla for the top spot of various charts.

Snake is readily available as a Malware-as-a-Service on underground forums, with pricing options that range from 25 to 500 USD.

This infostealer comes equipped with anti-evasion capabilities. In some samples, its downloader component was found to sleep for a period of time to evade automatic sandboxes. It can also terminate processes related to AV and network analysis tools, such as Avast and Wireshark.

Upon completing the initial process, Snake secures its persistence by duplicating itself into the AppData folder under a random name, generating a scheduled task configuration within a temporary directory, and initiating a scheduled task. What’s more, it possesses the ability to self-delete from the system post data exfiltration, employing a deletion command with a 3-second timer.

Snake keylogger execution process

As a typical stealer, Snake keylogger doesn't produce a lot of noticeable activity, which makes its detection potentially tricky. However, once it's established on an infected machine, it may increase its activity — capturing more data and sending it to the command-and-control server.

In the majority of Snake versions, a single process is responsible for all malicious activities, which include stealing data from the compromised system. In the specific sample of Snake we've analyzed, this process was identified as arinzehfkd685371.exe.

Snake keylogger main process

arinzehfkd685371.exe process details

The Snake malware uses a variety of tactics and techniques, as illustrated in the Mitre ATT&CK Matrix. Key strategies include:

  • exploiting client vulnerabilities for initial access
  • extracting credentials from files and password stores
  • querying the system registry
  • and collecting local emails.

It also uses tool transfers and mail protocols for command, control, and exfiltration purposes. Notably, a significant proportion of events (270) involved stealing credentials from files.

Snake keylogger ATT&CK Matrix The Mitre ATT&CK Matrix for Snake malware

During the analysis, ANY.RUN cloud interactive sandbox was able to retrieve Snake’s config automatically. The displayed configuration reveals the DES encryption key and the SMTP credentials used for data exfiltration.

Snake keylogger configuration Snake keylogger malware configuration

Network monitoring tools can use this SMTP information for detection, potentially flagging or blocking traffic associated with the host or email addresses.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of Snake malware

As is common with Malware-as-a-Service families, Snake is distributed through mass email phishing campaigns and targeted spearphishing. It is known to arrive via infected Microsoft Office documents or PDFs, typically embedded in payment-related messages.

Upon the user extracting the executable, it proceeds to decode and decrypt the base-64 payload, which is contained within a string variable.

Users are recommended to remain vigilant when downloading payment receipts or any documents from unfamiliar senders. Key signs of phishing attempts to look out for include poor grammar, manipulative messaging, and an unusually high number of typos for a professional email.

Snake malware conclusions

In closing, Snake is a powerful infostealer and keylogger that targets various industries and platforms, capable of extracting a wide range of data. Its sandbox evasion capabilities only add to the challenge of detection and analysis.

Try analyzing Snake in ANY.RUN. Create a free account using your business email to try out our interactive cloud malware sandbox.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
Ave Maria screenshot
Ave Maria
avemaria stealer trojan rat
Ave Maria malware is a Remote Access Trojan that is also called WARZONE RAT. Hackers use it to control the PCs of their victims remotely and steal information from infected PCs. For example, they can remotely activate the camera to take pictures of a victim and send them to a control server.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy