Snake Keylogger - Daily Threat Report

Thursday, April 23, 2026

Daily Summary

Today’s tally of 6 new Snake Keylogger samples represents a 121% surge above the 7-day average of 3, marking a sharp escalation in activity. This spike is driven primarily by JavaScript droppers, which account for half of all new submissions. Analysts should prepare for a potential sustained uptick as the campaign gains momentum.

New Samples Detected

The sample set is dominated by JavaScript files (.js: 3) and batch scripts (.bat: 2), with one .xlam add-in. This is a notable divergence from the usual VBA-laden Office documents or compiled executables. The .js files likely leverage WScript or Node.js to download and execute the payload, while the .bat files suggest simpler, possibly automated delivery chains. The lone .xlam file indicates continued exploitation of Excel add-ins for macro executions.

Distribution Methods

Given the file type mix, distribution appears to be shifting toward off-the-shelf script-based payloads, possibly delivered via phishing emails with attachments or links. The absence of new C2 servers suggests these samples may be targeting existing infrastructure rather than establishing fresh footholds. The .js and .bat files point to a lower technical barrier for attackers, likely part of a spray-and-pray campaign rather than targeted intrusions.

Detection Rate

Without live AV tests, we note that Snake Keylogger’s JavaScript and batch script variants often receive lower detection rates because they rely on living-off-the-land techniques. The lack of new C2 infrastructure may also indicate that these samples are being reused from earlier campaigns, which are already well-covered by signatures - though the .xlam file could represent a fresher variant that evades heuristic filters.

C2 Infrastructure

No new C2 servers were observed today, a stark contrast to the elevated sample volume. This suggests either a consolidation of existing servers or that the current samples are configured to phone home to previously known endpoints. Analysts should review any dormant C2 addresses from the past two weeks, as they may reactivate to support this spike.

7-Day Trend

Today’s surge pushes the weekly trend sharply upward after a stable period near the average. If this pace continues, sample counts could double again in 2-3 days, signaling the start of a new campaign wave.

Security Analysis

A notable observation is the near-complete absence of new C2 servers alongside the 121% sample increase. This divergence suggests the operator is reusing existing infrastructure, possibly to avoid tipping off defenders with fresh domains or IPs. Defenders should monitor for increased outbound traffic to known Snake Keylogger C2 endpoints, especially on non-standard ports, and block execution of unsigned .js files from email attachments as a proactive measure.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More Snake Keylogger Reports

Recent Malware Reports