Date: 09/18/2024
Severity: Medium
Summary
"SNAKE KEYLOGGER ACTIVITY" refers to the monitoring and recording of keystrokes by a keylogger, which is often used maliciously to capture sensitive information like passwords and credit card numbers. This activity can occur through software or hardware-based keyloggers. Understanding its implications is crucial for cybersecurity, as it can lead to identity theft and data breaches. Implementing security measures such as antivirus software, regular system updates, and user awareness can help mitigate risks associated with keylogger activity.
Indicators of Compromise (IOC) List
Hash |
0b2bd3030abd0361c0fcbe27efcb9ff9da2320a5025001ea06f4530446d09ead
bc5ee788c33389a426c9b5b10405a41a83f6875864bf09b0de6df15ab88cfbda |
Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection
Hash |
sha256hash IN ("0b2bd3030abd0361c0fcbe27efcb9ff9da2320a5025001ea06f4530446d09ead","bc5ee788c33389a426c9b5b10405a41a83f6875864bf09b0de6df15ab88cfbda") |
Reference:
https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-09-16-IOCs-for-Snake-KeyLogger.txt