SYMBOLCOMMON_NAMEaka. SYNONYMS
win.snappy_client (Back to overview)

SnappyClient


According to Zscaler, SnappyClient was first observed in December 2025. It is a C++-based C2 implant with the ability to steal data and provide remote access. SnappyClient employs multiple evasion techniques to hinder endpoint security detection, including an Antimalware Scan Interface (AMSI) bypass, as well as implementing Heaven’s Gate, direct system calls, and transacted hollowing. SnappyClient receives two configuration files from the C2 server, which contain a list of actions to perform when a specified condition is met, along with another that specifies applications to target for data theft. SnappyClient uses a custom network communication protocol that encrypts all network communication using ChaCha20-Poly1305.

References
2026-03-18ZscalerMuhammed Irfan V A
Technical analysis of SnappyClient
HijackLoader SnappyClient

There is no Yara-Signature yet.