: The archive is pulled from a command-and-control (C2) server.
: Researchers at Zscaler ThreatLabz observed threat actors using cURL to download svchost.rar as part of a multi-stage attack. Execution Flow : svchost.rar
: The actor uses the command tar -xvf svchost.rar to extract post-compromise tools. : The archive is pulled from a command-and-control
: After the internal tools are deployed, the command del /f /q svchost.rar is often issued to remove forensic traces. svchost.rar
: Check for related malicious processes or scheduled tasks that may have been established after the archive was extracted.