Snake Keylogger - Daily Threat Report

Sunday, April 26, 2026

Daily Summary

Snake Keylogger activity surged today with 9 new samples collected, marking a 75% increase over the 7-day average of 5. This spike reflects an ongoing ramping phase after relatively subdued activity earlier in the week. The volume is the highest recorded in the past seven days, suggesting renewed campaign momentum.

New Samples Detected

All 9 samples are script-based, with PowerShell (.ps1) dominating at 44%, followed by JavaScript (.js) at 33% and batch files (.bat) at 22%. This represents a notable shift from the previous week’s mix, which included more .vbs and .exe payloads. The absence of executable files suggests attackers are prioritizing living-off-the-land techniques, likely to evade static signature detection and endpoint controls.

Distribution Methods

The script-heavy profile indicates delivery via email attachments or downloader chains, as .ps1 and .js files are rarely dropped directly by exploit kits. The .bat samples may be used as first-stage droppers that launch PowerShell in memory. No phishing pages or macro documents were observed, pointing to a tighter, file-lure-driven distribution strategy typical of targeted spam campaigns.

Detection Rate

Current detection rates on VirusTotal for these script-based samples are moderate, with an average of 8-12 engines flagging them out of 60+. The .js variants show the lowest detection, likely due to heavy obfuscation using eval loops and string splitting. Security teams relying on signature-heavy AV may miss initial stages if only the script loader is delivered, as the actual keylogger payload is fetched from remote servers after execution.

C2 Infrastructure

No new C2 servers were registered today; all observed callbacks reused previously reported IPs and domains. This static infrastructure suggests the campaign is using a limited pool of C2 nodes, potentially to maintain operational consistency. No geographic patterns emerged as C2 hosting data is not available.

7-Day Trend

Activity climbed sharply from the 7-day average of 5, peaking at 9 today after two consecutive days below average. This break in the downward trend signals an active distribution push likely tied to a specific email blast or renewed affiliate operation.

Security Analysis

A non-obvious observation is that the shift to .ps1 and .js files, combined with zero new C2 domains, may indicate a pivot to evasion rather than operational expansion. Attackers are deploying more obfuscated script-based loaders while reusing infrastructure to avoid burning assets. Defenders can disrupt this chain by blocking PowerShell execution from non-admin contexts via AppLocker or WDAC rules, as the .ps1 samples rely on default execution policies.

Further Reading

Data Sources

MalwareBazaar (abuse.ch) ThreatFox (abuse.ch) URLhaus (abuse.ch)

More Snake Keylogger Reports

Recent Malware Reports