ZynorRAT technical analysis: Reverse engineering a novel, Turkish Go-based RAT
ZynorRAT is a newly discovered Go-based Remote Access Trojan that provides a full suite of command and control capabilities for Linux and Windows systems. It was first identified in July 2025 and is believed to be of Turkish origin. The malware uses Telegram as its C2 infrastructure and offers features such as file exfiltration, system enumeration, screenshot capture, persistence through systemd services, and arbitrary command execution. The Linux version is fully functional, while the Windows version appears to be in early development. The malware's author seems to be actively working on improving its detection avoidance. ZynorRAT's capabilities include discovery, exfiltration, persistence, and remote code execution on victim machines.
AI Analysis
Technical Summary
ZynorRAT is a recently identified Remote Access Trojan (RAT) written in the Go programming language, targeting both Linux and Windows platforms, with a more mature Linux variant and a Windows version still in early development. First detected in July 2025, it is believed to originate from Turkey. The malware leverages Telegram as its command and control (C2) infrastructure, enabling operators to remotely manage infected systems through a widely used, encrypted messaging platform, complicating detection and blocking efforts. ZynorRAT provides a comprehensive set of capabilities typical of advanced RATs, including system enumeration (gathering information about the victim machine), file exfiltration (stealing files from the victim), screenshot capture, persistence mechanisms via systemd services on Linux, and arbitrary command execution, allowing attackers to run any commands on compromised hosts. The use of systemd services for persistence indicates a deep integration with Linux system internals, making removal more challenging. The malware’s author is actively enhancing evasion techniques to avoid detection by security solutions. The RAT’s modular capabilities align with MITRE ATT&CK techniques such as T1113 (screen capture), T1543.003 (systemd service), T1082 (system information discovery), T1059 (command execution), T1083 (file and directory discovery), T1057 (process discovery), T1102.002 (communication through Telegram), T1071.001 (application layer protocol), T1105 (remote file copy), T1021.001 (remote services), and T1569.002 (systemd service execution). Although no known exploits are currently reported in the wild, the malware’s active development and feature set suggest a potential for future targeted campaigns. The use of Go language allows cross-platform compatibility and ease of deployment, while Telegram-based C2 offers stealth and resilience against traditional network monitoring.
Potential Impact
For European organizations, ZynorRAT poses a significant threat primarily to Linux-based infrastructure, which is widely used in enterprise environments, cloud services, and critical infrastructure sectors. The malware’s ability to exfiltrate sensitive files and execute arbitrary commands can lead to data breaches, intellectual property theft, and operational disruption. Persistence via systemd services complicates remediation efforts, potentially allowing prolonged unauthorized access. The use of Telegram for C2 communications may bypass conventional network security controls, increasing the risk of undetected lateral movement and espionage. Although the Windows variant is less mature, its development indicates a future expansion of the threat to Windows endpoints, broadening the attack surface. European organizations in sectors such as finance, manufacturing, telecommunications, and government are particularly at risk due to their reliance on Linux servers and the strategic value of their data. The medium severity rating reflects the current limited deployment and lack of widespread exploitation but does not diminish the potential for escalation. The threat also underscores the need for vigilance against novel malware leveraging legitimate platforms for C2, which can evade traditional detection mechanisms.
Mitigation Recommendations
To mitigate the risk posed by ZynorRAT, European organizations should implement targeted measures beyond generic best practices: 1) Monitor and restrict Telegram traffic within enterprise networks, employing deep packet inspection and behavioral analysis to detect anomalous usage patterns indicative of C2 communications. 2) Harden Linux systems by auditing and restricting systemd service creation and modifications, employing file integrity monitoring to detect unauthorized persistence mechanisms. 3) Deploy endpoint detection and response (EDR) solutions capable of identifying Go-based malware behaviors, including unusual process executions, file access patterns, and network connections to Telegram endpoints. 4) Conduct regular threat hunting exercises focusing on indicators of compromise related to system enumeration, screenshot capture, and file exfiltration activities. 5) Enforce strict access controls and segmentation to limit lateral movement opportunities if an infection occurs. 6) Maintain up-to-date backups and incident response plans tailored to handle advanced persistent threats with stealthy persistence. 7) Educate security teams on emerging threats leveraging legitimate communication platforms for C2 to improve detection and response capabilities. 8) Collaborate with threat intelligence sharing communities to stay informed about developments in ZynorRAT’s capabilities and deployment.
Affected Countries
Turkey, Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- ip: 102.129.152.199
- ip: 136.144.33.64
- ip: 213.33.190.191
- ip: 79.104.209.144
- hash: 073ea1d3dcbe5d9522051e1a085ed5b7
- hash: 156195fa921d14a24d3b61239db14d28
- hash: 1d825e867cb0f409dc15d7444d475e86
- hash: 7422122eec7cfb3ec44737607d3ff5d2
- hash: 780f1447be2e88e72067ed2e66f51256
- hash: 7a97e01b8ef206f5dce592ff68442e1e
- hash: be3d985a4a76dfeaf485955c1ef67249
- hash: 0028560839604fd4f2abda139d3752c8ee12b360
- hash: 170d031cf7436bc2a4d2d2fabf7d09c61074f1a1
- hash: 2e3b81497f6cb06c91b2e60753340db84d09e378
- hash: 45abdc39bdf66b1f94f24e49c651e6103b85ad28
- hash: 9dfef2e802a995c4a6ba03820c8f514898cfcf88
- hash: b6084705098bd96b512858ad32084605c74b1eb1
- hash: ba624281518c42c9ec6b7ece87074ceb90f5b75c
- hash: 037e5fe028a60604523b840794d06c8f70a9c523a832a97ecaaccd9f419e364a
- hash: 237a40e522f2f1e6c71415997766b4b23f1526e2f141d68ff334de3ff5b0c89f
- hash: 47338da15a35c49bcd3989125df5b082eef64ba646bb7a2db1565bb413b69323
- hash: 48c2a8453feea72f8d9bfb9c2731d811e7c300f3e1935bddd7188324aab7d30d
- hash: 4cd270b49c8d5c31560ef94dc0bee2c7927d6f3e77173f660e2f3106ae7131c3
- hash: 8b09ba6e006718371486b3655588b438ade953beecf221af38160cbe6fedd40a
- hash: a6c450f9abff8a22445ba539c21b24508dd326522df525977e14ec17e11f7d65
- hash: bceccc566fe3ae3675f7e20100f979eaf2053d9a4f3a3619a550a496a4268ef5
- hash: c890c6e6b7cc6984cd9d9061d285d814841e0b8136286e6fd943013260eb8461
- hash: f9eb2a54e500b3ce42950fb75af30955180360c978c00d081ea561c86e54262d
- ip: 136.144.33.66
- ip: 140.228.21.191
- ip: 154.61.71.50
- ip: 176.238.224.71
- ip: 176.88.126.219
- ip: 178.244.44.146
- ip: 185.171.76.209
- ip: 185.244.192.175
- ip: 185.93.40.66
- ip: 194.154.78.108
- ip: 194.154.78.140
- ip: 194.154.78.146
- ip: 194.154.78.207
- ip: 194.154.78.212
- ip: 194.154.78.215
- ip: 195.239.51.34
- ip: 195.68.142.27
- ip: 195.68.142.8
- ip: 198.44.129.137
- ip: 199.203.206.147
- ip: 213.33.190.106
- ip: 213.33.190.139
- ip: 213.33.190.152
- ip: 217.131.107.38
- ip: 24.99.144.70
- ip: 64.124.77.153
- ip: 77.37.103.74
- ip: 79.104.209.186
- ip: 79.104.209.215
- ip: 79.104.209.84
- ip: 79.104.209.92
- ip: 87.166.58.36
- ip: 93.216.69.15
- domain: network.target
ZynorRAT technical analysis: Reverse engineering a novel, Turkish Go-based RAT
Description
ZynorRAT is a newly discovered Go-based Remote Access Trojan that provides a full suite of command and control capabilities for Linux and Windows systems. It was first identified in July 2025 and is believed to be of Turkish origin. The malware uses Telegram as its C2 infrastructure and offers features such as file exfiltration, system enumeration, screenshot capture, persistence through systemd services, and arbitrary command execution. The Linux version is fully functional, while the Windows version appears to be in early development. The malware's author seems to be actively working on improving its detection avoidance. ZynorRAT's capabilities include discovery, exfiltration, persistence, and remote code execution on victim machines.
AI-Powered Analysis
Technical Analysis
ZynorRAT is a recently identified Remote Access Trojan (RAT) written in the Go programming language, targeting both Linux and Windows platforms, with a more mature Linux variant and a Windows version still in early development. First detected in July 2025, it is believed to originate from Turkey. The malware leverages Telegram as its command and control (C2) infrastructure, enabling operators to remotely manage infected systems through a widely used, encrypted messaging platform, complicating detection and blocking efforts. ZynorRAT provides a comprehensive set of capabilities typical of advanced RATs, including system enumeration (gathering information about the victim machine), file exfiltration (stealing files from the victim), screenshot capture, persistence mechanisms via systemd services on Linux, and arbitrary command execution, allowing attackers to run any commands on compromised hosts. The use of systemd services for persistence indicates a deep integration with Linux system internals, making removal more challenging. The malware’s author is actively enhancing evasion techniques to avoid detection by security solutions. The RAT’s modular capabilities align with MITRE ATT&CK techniques such as T1113 (screen capture), T1543.003 (systemd service), T1082 (system information discovery), T1059 (command execution), T1083 (file and directory discovery), T1057 (process discovery), T1102.002 (communication through Telegram), T1071.001 (application layer protocol), T1105 (remote file copy), T1021.001 (remote services), and T1569.002 (systemd service execution). Although no known exploits are currently reported in the wild, the malware’s active development and feature set suggest a potential for future targeted campaigns. The use of Go language allows cross-platform compatibility and ease of deployment, while Telegram-based C2 offers stealth and resilience against traditional network monitoring.
Potential Impact
For European organizations, ZynorRAT poses a significant threat primarily to Linux-based infrastructure, which is widely used in enterprise environments, cloud services, and critical infrastructure sectors. The malware’s ability to exfiltrate sensitive files and execute arbitrary commands can lead to data breaches, intellectual property theft, and operational disruption. Persistence via systemd services complicates remediation efforts, potentially allowing prolonged unauthorized access. The use of Telegram for C2 communications may bypass conventional network security controls, increasing the risk of undetected lateral movement and espionage. Although the Windows variant is less mature, its development indicates a future expansion of the threat to Windows endpoints, broadening the attack surface. European organizations in sectors such as finance, manufacturing, telecommunications, and government are particularly at risk due to their reliance on Linux servers and the strategic value of their data. The medium severity rating reflects the current limited deployment and lack of widespread exploitation but does not diminish the potential for escalation. The threat also underscores the need for vigilance against novel malware leveraging legitimate platforms for C2, which can evade traditional detection mechanisms.
Mitigation Recommendations
To mitigate the risk posed by ZynorRAT, European organizations should implement targeted measures beyond generic best practices: 1) Monitor and restrict Telegram traffic within enterprise networks, employing deep packet inspection and behavioral analysis to detect anomalous usage patterns indicative of C2 communications. 2) Harden Linux systems by auditing and restricting systemd service creation and modifications, employing file integrity monitoring to detect unauthorized persistence mechanisms. 3) Deploy endpoint detection and response (EDR) solutions capable of identifying Go-based malware behaviors, including unusual process executions, file access patterns, and network connections to Telegram endpoints. 4) Conduct regular threat hunting exercises focusing on indicators of compromise related to system enumeration, screenshot capture, and file exfiltration activities. 5) Enforce strict access controls and segmentation to limit lateral movement opportunities if an infection occurs. 6) Maintain up-to-date backups and incident response plans tailored to handle advanced persistent threats with stealthy persistence. 7) Educate security teams on emerging threats leveraging legitimate communication platforms for C2 to improve detection and response capabilities. 8) Collaborate with threat intelligence sharing communities to stay informed about developments in ZynorRAT’s capabilities and deployment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.sysdig.com/blog/zynorrat-technical-analysis-reverse-engineering-a-novel-turkish-go-based-rat"]
- Adversary
- null
- Pulse Id
- 68c12ec5eb851e4417b21f49
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip102.129.152.199 | — | |
ip136.144.33.64 | — | |
ip213.33.190.191 | — | |
ip79.104.209.144 | — | |
ip136.144.33.66 | — | |
ip140.228.21.191 | — | |
ip154.61.71.50 | — | |
ip176.238.224.71 | — | |
ip176.88.126.219 | — | |
ip178.244.44.146 | — | |
ip185.171.76.209 | — | |
ip185.244.192.175 | — | |
ip185.93.40.66 | — | |
ip194.154.78.108 | — | |
ip194.154.78.140 | — | |
ip194.154.78.146 | — | |
ip194.154.78.207 | — | |
ip194.154.78.212 | — | |
ip194.154.78.215 | — | |
ip195.239.51.34 | — | |
ip195.68.142.27 | — | |
ip195.68.142.8 | — | |
ip198.44.129.137 | — | |
ip199.203.206.147 | — | |
ip213.33.190.106 | — | |
ip213.33.190.139 | — | |
ip213.33.190.152 | — | |
ip217.131.107.38 | — | |
ip24.99.144.70 | — | |
ip64.124.77.153 | — | |
ip77.37.103.74 | — | |
ip79.104.209.186 | — | |
ip79.104.209.215 | — | |
ip79.104.209.84 | — | |
ip79.104.209.92 | — | |
ip87.166.58.36 | — | |
ip93.216.69.15 | — |
Hash
Value | Description | Copy |
---|---|---|
hash073ea1d3dcbe5d9522051e1a085ed5b7 | — | |
hash156195fa921d14a24d3b61239db14d28 | — | |
hash1d825e867cb0f409dc15d7444d475e86 | — | |
hash7422122eec7cfb3ec44737607d3ff5d2 | — | |
hash780f1447be2e88e72067ed2e66f51256 | — | |
hash7a97e01b8ef206f5dce592ff68442e1e | — | |
hashbe3d985a4a76dfeaf485955c1ef67249 | — | |
hash0028560839604fd4f2abda139d3752c8ee12b360 | — | |
hash170d031cf7436bc2a4d2d2fabf7d09c61074f1a1 | — | |
hash2e3b81497f6cb06c91b2e60753340db84d09e378 | — | |
hash45abdc39bdf66b1f94f24e49c651e6103b85ad28 | — | |
hash9dfef2e802a995c4a6ba03820c8f514898cfcf88 | — | |
hashb6084705098bd96b512858ad32084605c74b1eb1 | — | |
hashba624281518c42c9ec6b7ece87074ceb90f5b75c | — | |
hash037e5fe028a60604523b840794d06c8f70a9c523a832a97ecaaccd9f419e364a | — | |
hash237a40e522f2f1e6c71415997766b4b23f1526e2f141d68ff334de3ff5b0c89f | — | |
hash47338da15a35c49bcd3989125df5b082eef64ba646bb7a2db1565bb413b69323 | — | |
hash48c2a8453feea72f8d9bfb9c2731d811e7c300f3e1935bddd7188324aab7d30d | — | |
hash4cd270b49c8d5c31560ef94dc0bee2c7927d6f3e77173f660e2f3106ae7131c3 | — | |
hash8b09ba6e006718371486b3655588b438ade953beecf221af38160cbe6fedd40a | — | |
hasha6c450f9abff8a22445ba539c21b24508dd326522df525977e14ec17e11f7d65 | — | |
hashbceccc566fe3ae3675f7e20100f979eaf2053d9a4f3a3619a550a496a4268ef5 | — | |
hashc890c6e6b7cc6984cd9d9061d285d814841e0b8136286e6fd943013260eb8461 | — | |
hashf9eb2a54e500b3ce42950fb75af30955180360c978c00d081ea561c86e54262d | — |
Domain
Value | Description | Copy |
---|---|---|
domainnetwork.target | — |
Threat ID: 68c13393e55cc6e90d9fc6b4
Added to database: 9/10/2025, 8:15:15 AM
Last enriched: 9/10/2025, 8:30:25 AM
Last updated: 9/10/2025, 9:54:08 PM
Views: 14
Related Threats
ThreatFox IOCs for 2025-09-10
MediumEggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company
MediumTechnical Analysis of kkRAT
MediumLearn about ChillyHell, a modular Mac backdoor
MediumAdaptixC2: A New Open-Source Framework Leveraged in Real-World Attacks
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.