Skip to content

: Analysis on platforms like ANY.RUN has tagged variants of this archive with the Quasar RAT .

: Look for unauthorized cURL or tar commands in system audit logs. GOGITTER, GITSHELLPAD, and GOSHELL Analysis

: Immediately disconnect any machine where this file was detected from the network.

Analysis of the file reveals it is a malicious archive frequently used in Advanced Persistent Threat (APT) campaigns to deploy remote access tools and steal data. Executive Summary

The file is identified as a malicious container used by threat actors to deliver payloads while mimicking legitimate Windows system processes (svchost.exe). Recent activity (January 2026) links this specific file name to a campaign targeting government entities. Technical Findings

: Researchers at Zscaler ThreatLabz observed threat actors using cURL to download svchost.rar as part of a multi-stage attack. Execution Flow :