Snake Keylogger - Detection Rate

VirusTotal detection statistics across 27 analyzed samples.

Last updated: 2026-05-16

Detection rates show how many antivirus engines on VirusTotal identify Snake Keylogger samples as malicious. A high detection rate (30+ engines) means most AV vendors have signatures for the variant. Low or zero detection indicates recently packed or obfuscated samples that may bypass signature-based endpoint protection.

Why Detection Rate Matters

For SOC analysts and threat hunters, detection rate is a key indicator of variant freshness and evasion capability. When Snake Keylogger operators release a new build with updated packing or obfuscation, detection rates drop temporarily until AV vendors update their signatures. This window of low detection is when organizations are most vulnerable. Monitoring this page helps you understand how well your current defenses cover Snake Keylogger variants.

Recommended Actions

If you see undetected or low-detection samples, consider submitting them to your sandbox for behavioral analysis. Update your YARA rules to catch Snake Keylogger patterns that signature-based detection misses. For the latest sample hashes to cross-reference, visit the Snake Keylogger samples page. For network-level indicators, check the IOC page.

30/64
Avg Detection
27
Samples Analyzed
9
High Detection
0
Undetected

Detection Distribution

High (30+) 9 (33%)
Medium (15-29) 12 (44%)
Low (1-14) 6 (22%)
Undetected (0) 0 (0%)

Per-Sample Detection

SHA256 Detection Threat Name
6e2c7b90b921e3a7... 55/71 trojan.msil/powershell
348237414eee4aa4... 54/71 trojan.msil/remcos
6f156b9664a0f933... 53/71 trojan.msil/cryp
475134fd1bd6af31... 53/71 trojan.autoit/scrop
a0ae3275aed9137a... 51/68 trojan.autoit/auitinj
fa8bed9286024914... 50/72 trojan.msil/genie
28e6160a0c931d07... 50/66 trojan.autoit/scrop
1741fe897473e7b6... 45/63 trojan.msil/darkcloud
8a93756d5216c939... 34/66 trojan.mathtype/obfs
79e6b2c3d0105007... 29/72 trojan.msil/snakelogger
be06aab9e611d76a... 29/69 trojan.dacic
b9552a61439efa4f... 28/62 trojan.cobalt
2525aba3aa0c6896... 25/61 trojan.
70b8e9cd74923561... 25/66 trojan.msil/krypt
88d63b0589f9ccb2... 23/62 trojan.acsogenixx/adyg
bbe37ae6c1d6534d... 22/61 trojan.powershell/injectornett
7d90636465939a1a... 22/69 trojan.dllhijack
419b24867a2cdba9... 20/63 trojan.boxter/powershell
ec628a344ca23797... 19/59 trojan.formbook
83bbbf8a6bf9ea44... 18/62 trojan.cryxos
ce6fb377a643909b... 18/60 trojan.powershell/remcos
671839c24c52d9e1... 14/52 trojan.
132fbaa338bf5782... 14/61 trojan.powershell
a4e9bbd5382dd359... 14/58 trojan.boxter/negasteal
31ee885db60cd911... 13/55 trojan.powershell/snakestealer
99f0cef71d37176e... 12/61 trojan.boxter/stealer
84ae4d3d39fa01c5... 7/61 trojan.shellcoderunner