Skip to main content

ZynorRAT technical analysis: Reverse engineering a novel, Turkish Go-based RAT

Medium
Published: Wed Sep 10 2025 (09/10/2025, 07:54:45 UTC)
Source: AlienVault OTX General

Description

ZynorRAT is a newly discovered Go-based Remote Access Trojan that provides a full suite of command and control capabilities for Linux and Windows systems. It was first identified in July 2025 and is believed to be of Turkish origin. The malware uses Telegram as its C2 infrastructure and offers features such as file exfiltration, system enumeration, screenshot capture, persistence through systemd services, and arbitrary command execution. The Linux version is fully functional, while the Windows version appears to be in early development. The malware's author seems to be actively working on improving its detection avoidance. ZynorRAT's capabilities include discovery, exfiltration, persistence, and remote code execution on victim machines.

AI-Powered Analysis

AILast updated: 09/10/2025, 08:30:25 UTC

Technical Analysis

ZynorRAT is a recently identified Remote Access Trojan (RAT) written in the Go programming language, targeting both Linux and Windows platforms, with a more mature Linux variant and a Windows version still in early development. First detected in July 2025, it is believed to originate from Turkey. The malware leverages Telegram as its command and control (C2) infrastructure, enabling operators to remotely manage infected systems through a widely used, encrypted messaging platform, complicating detection and blocking efforts. ZynorRAT provides a comprehensive set of capabilities typical of advanced RATs, including system enumeration (gathering information about the victim machine), file exfiltration (stealing files from the victim), screenshot capture, persistence mechanisms via systemd services on Linux, and arbitrary command execution, allowing attackers to run any commands on compromised hosts. The use of systemd services for persistence indicates a deep integration with Linux system internals, making removal more challenging. The malware’s author is actively enhancing evasion techniques to avoid detection by security solutions. The RAT’s modular capabilities align with MITRE ATT&CK techniques such as T1113 (screen capture), T1543.003 (systemd service), T1082 (system information discovery), T1059 (command execution), T1083 (file and directory discovery), T1057 (process discovery), T1102.002 (communication through Telegram), T1071.001 (application layer protocol), T1105 (remote file copy), T1021.001 (remote services), and T1569.002 (systemd service execution). Although no known exploits are currently reported in the wild, the malware’s active development and feature set suggest a potential for future targeted campaigns. The use of Go language allows cross-platform compatibility and ease of deployment, while Telegram-based C2 offers stealth and resilience against traditional network monitoring.

Potential Impact

For European organizations, ZynorRAT poses a significant threat primarily to Linux-based infrastructure, which is widely used in enterprise environments, cloud services, and critical infrastructure sectors. The malware’s ability to exfiltrate sensitive files and execute arbitrary commands can lead to data breaches, intellectual property theft, and operational disruption. Persistence via systemd services complicates remediation efforts, potentially allowing prolonged unauthorized access. The use of Telegram for C2 communications may bypass conventional network security controls, increasing the risk of undetected lateral movement and espionage. Although the Windows variant is less mature, its development indicates a future expansion of the threat to Windows endpoints, broadening the attack surface. European organizations in sectors such as finance, manufacturing, telecommunications, and government are particularly at risk due to their reliance on Linux servers and the strategic value of their data. The medium severity rating reflects the current limited deployment and lack of widespread exploitation but does not diminish the potential for escalation. The threat also underscores the need for vigilance against novel malware leveraging legitimate platforms for C2, which can evade traditional detection mechanisms.

Mitigation Recommendations

To mitigate the risk posed by ZynorRAT, European organizations should implement targeted measures beyond generic best practices: 1) Monitor and restrict Telegram traffic within enterprise networks, employing deep packet inspection and behavioral analysis to detect anomalous usage patterns indicative of C2 communications. 2) Harden Linux systems by auditing and restricting systemd service creation and modifications, employing file integrity monitoring to detect unauthorized persistence mechanisms. 3) Deploy endpoint detection and response (EDR) solutions capable of identifying Go-based malware behaviors, including unusual process executions, file access patterns, and network connections to Telegram endpoints. 4) Conduct regular threat hunting exercises focusing on indicators of compromise related to system enumeration, screenshot capture, and file exfiltration activities. 5) Enforce strict access controls and segmentation to limit lateral movement opportunities if an infection occurs. 6) Maintain up-to-date backups and incident response plans tailored to handle advanced persistent threats with stealthy persistence. 7) Educate security teams on emerging threats leveraging legitimate communication platforms for C2 to improve detection and response capabilities. 8) Collaborate with threat intelligence sharing communities to stay informed about developments in ZynorRAT’s capabilities and deployment.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.sysdig.com/blog/zynorrat-technical-analysis-reverse-engineering-a-novel-turkish-go-based-rat"]
Adversary
null
Pulse Id
68c12ec5eb851e4417b21f49
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip102.129.152.199
ip136.144.33.64
ip213.33.190.191
ip79.104.209.144
ip136.144.33.66
ip140.228.21.191
ip154.61.71.50
ip176.238.224.71
ip176.88.126.219
ip178.244.44.146
ip185.171.76.209
ip185.244.192.175
ip185.93.40.66
ip194.154.78.108
ip194.154.78.140
ip194.154.78.146
ip194.154.78.207
ip194.154.78.212
ip194.154.78.215
ip195.239.51.34
ip195.68.142.27
ip195.68.142.8
ip198.44.129.137
ip199.203.206.147
ip213.33.190.106
ip213.33.190.139
ip213.33.190.152
ip217.131.107.38
ip24.99.144.70
ip64.124.77.153
ip77.37.103.74
ip79.104.209.186
ip79.104.209.215
ip79.104.209.84
ip79.104.209.92
ip87.166.58.36
ip93.216.69.15

Hash

ValueDescriptionCopy
hash073ea1d3dcbe5d9522051e1a085ed5b7
hash156195fa921d14a24d3b61239db14d28
hash1d825e867cb0f409dc15d7444d475e86
hash7422122eec7cfb3ec44737607d3ff5d2
hash780f1447be2e88e72067ed2e66f51256
hash7a97e01b8ef206f5dce592ff68442e1e
hashbe3d985a4a76dfeaf485955c1ef67249
hash0028560839604fd4f2abda139d3752c8ee12b360
hash170d031cf7436bc2a4d2d2fabf7d09c61074f1a1
hash2e3b81497f6cb06c91b2e60753340db84d09e378
hash45abdc39bdf66b1f94f24e49c651e6103b85ad28
hash9dfef2e802a995c4a6ba03820c8f514898cfcf88
hashb6084705098bd96b512858ad32084605c74b1eb1
hashba624281518c42c9ec6b7ece87074ceb90f5b75c
hash037e5fe028a60604523b840794d06c8f70a9c523a832a97ecaaccd9f419e364a
hash237a40e522f2f1e6c71415997766b4b23f1526e2f141d68ff334de3ff5b0c89f
hash47338da15a35c49bcd3989125df5b082eef64ba646bb7a2db1565bb413b69323
hash48c2a8453feea72f8d9bfb9c2731d811e7c300f3e1935bddd7188324aab7d30d
hash4cd270b49c8d5c31560ef94dc0bee2c7927d6f3e77173f660e2f3106ae7131c3
hash8b09ba6e006718371486b3655588b438ade953beecf221af38160cbe6fedd40a
hasha6c450f9abff8a22445ba539c21b24508dd326522df525977e14ec17e11f7d65
hashbceccc566fe3ae3675f7e20100f979eaf2053d9a4f3a3619a550a496a4268ef5
hashc890c6e6b7cc6984cd9d9061d285d814841e0b8136286e6fd943013260eb8461
hashf9eb2a54e500b3ce42950fb75af30955180360c978c00d081ea561c86e54262d

Domain

ValueDescriptionCopy
domainnetwork.target

Threat ID: 68c13393e55cc6e90d9fc6b4

Added to database: 9/10/2025, 8:15:15 AM

Last enriched: 9/10/2025, 8:30:25 AM

Last updated: 9/10/2025, 9:54:08 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats