Snake Keylogger - Detection Rate

VirusTotal detection statistics across 4 analyzed samples.

Last updated: 2026-04-18

Detection rates show how many antivirus engines on VirusTotal identify Snake Keylogger samples as malicious. A high detection rate (30+ engines) means most AV vendors have signatures for the variant. Low or zero detection indicates recently packed or obfuscated samples that may bypass signature-based endpoint protection.

Why Detection Rate Matters

For SOC analysts and threat hunters, detection rate is a key indicator of variant freshness and evasion capability. When Snake Keylogger operators release a new build with updated packing or obfuscation, detection rates drop temporarily until AV vendors update their signatures. This window of low detection is when organizations are most vulnerable. Monitoring this page helps you understand how well your current defenses cover Snake Keylogger variants.

Recommended Actions

If you see undetected or low-detection samples, consider submitting them to your sandbox for behavioral analysis. Update your YARA rules to catch Snake Keylogger patterns that signature-based detection misses. For the latest sample hashes to cross-reference, visit the Snake Keylogger samples page. For network-level indicators, check the IOC page.

35/68
Avg Detection
4
Samples Analyzed
2
High Detection
0
Undetected

Detection Distribution

High (30+) 2 (50%)
Medium (15-29) 2 (50%)
Low (1-14) 0 (0%)
Undetected (0) 0 (0%)

Per-Sample Detection

SHA256 Detection Threat Name
348237414eee4aa4... 54/71 trojan.msil/remcos
8a93756d5216c939... 34/66 trojan.mathtype/obfs
79e6b2c3d0105007... 29/72 trojan.msil/snakelogger
88d63b0589f9ccb2... 23/62 trojan.acsogenixx/adyg