URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-in...
Submission: On January 08 via api from US

Summary

This website contacted 45 IPs in 8 countries across 35 domains to perform 130 HTTP transactions. The main IP is 130.211.198.3, located in Mountain View, United States and belongs to GOOGLE, US. The main domain is blog.malwarebytes.com.
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on April 2nd 2019. Valid for: 2 years.
This is the only time blog.malwarebytes.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
50 130.211.198.3 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
10 2600:9000:219... 16509 (AMAZON-02)
2 52.239.137.4 8075 (MICROSOFT...)
1 192.0.77.32 2635 (AUTOMATTIC)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
1 2a04:fa87:fff... 2635 (AUTOMATTIC)
3 2a00:1450:400... 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 199.232.136.157 54113 (FASTLY)
3 2606:4700::68... 13335 (CLOUDFLAR...)
4 151.101.112.134 54113 (FASTLY)
1 2600:1f18:21a... 14618 (AMAZON-AES)
2 2620:1ec:c11:... 8068 (MICROSOFT...)
1 2 172.217.18.166 15169 (GOOGLE)
1 13.224.100.124 16509 (AMAZON-02)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2620:1ec:21::14 8068 (MICROSOFT...)
1 2a00:1450:400... 15169 (GOOGLE)
1 104.244.42.133 13414 (TWITTER)
1 52.85.115.13 16509 (AMAZON-02)
1 172.217.22.66 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 13.224.94.61 16509 (AMAZON-02)
2 2 52.214.70.9 16509 (AMAZON-02)
1 2 13.224.94.99 16509 (AMAZON-02)
1 34.120.207.148 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
9 2606:4700::68... 13335 (CLOUDFLAR...)
5 151.101.192.134 54113 (FASTLY)
1 2 216.58.205.230 15169 (GOOGLE)
3 2a03:2880:f02... 32934 (FACEBOOK)
1 151.101.13.2 54113 (FASTLY)
2 3 54.194.211.3 16509 (AMAZON-02)
2 2a00:1288:f03... 10310 (YAHOO-1)
2 104.111.236.192 16625 (AKAMAI-AS)
1 104.244.42.3 13414 (TWITTER)
1 34.251.161.187 16509 (AMAZON-02)
2 2a03:2880:f12... 32934 (FACEBOOK)
1 3.225.115.141 14618 (AMAZON-AES)
1 212.82.100.181 34010 (YAHOO-IRD)
1 192.28.144.124 15224 (OMNITURE)
130 45
Apex Domain
Subdomains
Transfer
61 malwarebytes.com
blog.malwarebytes.com
www.malwarebytes.com
genesis.malwarebytes.com
3 MB
9 disquscdn.com
c.disquscdn.com
688 KB
9 disqus.com
malwarebytesunpacked.disqus.com
disqus.com
102 KB
6 doubleclick.net
9812475.fls.doubleclick.net
stats.g.doubleclick.net
googleads.g.doubleclick.net
5118230.fls.doubleclick.net
3 KB
3 facebook.net
connect.facebook.net
92 KB
3 company-target.com
api.company-target.com
segments.company-target.com
2 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
2 KB
3 crazyegg.com
script.crazyegg.com
36 KB
3 google-analytics.com
www.google-analytics.com
19 KB
2 facebook.com
www.facebook.com
333 B
2 marketo.net
munchkin.marketo.net
7 KB
2 yimg.com
s.yimg.com
7 KB
2 avct.cloud
ads.avct.cloud
750 B
2 quora.com
a.quora.com
q.quora.com
14 KB
2 bidr.io
match.prod.bidr.io
1019 B
2 google.de
www.google.de
637 B
2 google.com
www.google.com
425 B
2 adsrvr.org
js.adsrvr.org
insight.adsrvr.org
2 KB
2 bing.com
bat.bing.com
9 KB
2 googletagmanager.com
www.googletagmanager.com
103 KB
2 windows.net
optanon.blob.core.windows.net
27 KB
1 mktoresp.com
805-usg-300.mktoresp.com
311 B
1 yahoo.com
sp.analytics.yahoo.com
933 B
1 twitter.com
analytics.twitter.com
653 B
1 avocet.io
ads.avocet.io
156 B
1 rlcdn.com
id.rlcdn.com
66 B
1 googleadservices.com
www.googleadservices.com
13 KB
1 demandbase.com
scripts.demandbase.com
16 KB
1 t.co
t.co
448 B
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 licdn.com
snap.licdn.com
2 KB
1 gravatar.com
secure.gravatar.com
11 KB
1 onetrust.com
geolocation.onetrust.com
404 B
1 wp.com
s0.wp.com
3 KB
1 googleapis.com
fonts.googleapis.com
1 KB
130 35
Domain Requested by
50 blog.malwarebytes.com blog.malwarebytes.com
www.malwarebytes.com
10 www.malwarebytes.com blog.malwarebytes.com
www.googletagmanager.com
9 c.disquscdn.com malwarebytesunpacked.disqus.com
5 disqus.com malwarebytesunpacked.disqus.com
4 malwarebytesunpacked.disqus.com blog.malwarebytes.com
www.malwarebytes.com
3 connect.facebook.net blog.malwarebytes.com
connect.facebook.net
3 script.crazyegg.com www.googletagmanager.com
script.crazyegg.com
3 www.google-analytics.com blog.malwarebytes.com
www.google-analytics.com
2 www.facebook.com connect.facebook.net
2 munchkin.marketo.net blog.malwarebytes.com
munchkin.marketo.net
2 s.yimg.com blog.malwarebytes.com
s.yimg.com
2 ads.avct.cloud 1 redirects
2 5118230.fls.doubleclick.net 1 redirects www.malwarebytes.com
2 segments.company-target.com 1 redirects blog.malwarebytes.com
2 match.prod.bidr.io 2 redirects
2 www.google.de blog.malwarebytes.com
2 www.google.com blog.malwarebytes.com
2 px.ads.linkedin.com 1 redirects blog.malwarebytes.com
2 9812475.fls.doubleclick.net 1 redirects www.googletagmanager.com
2 bat.bing.com www.googletagmanager.com
blog.malwarebytes.com
2 www.googletagmanager.com blog.malwarebytes.com
www.googletagmanager.com
2 optanon.blob.core.windows.net blog.malwarebytes.com
optanon.blob.core.windows.net
1 805-usg-300.mktoresp.com munchkin.marketo.net
1 sp.analytics.yahoo.com s.yimg.com
1 q.quora.com
1 insight.adsrvr.org js.adsrvr.org
1 analytics.twitter.com static.ads-twitter.com
1 ads.avocet.io 1 redirects
1 a.quora.com blog.malwarebytes.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 id.rlcdn.com blog.malwarebytes.com
1 api.company-target.com scripts.demandbase.com
1 www.googleadservices.com www.googletagmanager.com
1 scripts.demandbase.com blog.malwarebytes.com
1 t.co blog.malwarebytes.com
1 stats.g.doubleclick.net www.google-analytics.com
1 www.linkedin.com 1 redirects
1 js.adsrvr.org www.googletagmanager.com
1 genesis.malwarebytes.com www.malwarebytes.com
1 static.ads-twitter.com blog.malwarebytes.com
1 snap.licdn.com www.googletagmanager.com
1 secure.gravatar.com blog.malwarebytes.com
1 geolocation.onetrust.com www.malwarebytes.com
1 s0.wp.com blog.malwarebytes.com
1 fonts.googleapis.com blog.malwarebytes.com
130 45
Subject Issuer Validity Valid
blog.malwarebytes.com
DigiCert SHA2 High Assurance Server CA
2019-04-02 -
2021-07-05
2 years crt.sh
upload.video.google.com
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
*.malwarebytes.com
DigiCert SHA2 High Assurance Server CA
2020-04-10 -
2022-05-23
2 years crt.sh
*.blob.core.windows.net
Microsoft RSA TLS CA 02
2020-12-02 -
2021-12-02
a year crt.sh
*.wp.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-02 -
2022-07-05
2 years crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2020-05-21 -
2022-07-27
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
*.gravatar.com
Sectigo RSA Domain Validation Secure Server CA
2020-08-14 -
2022-11-16
2 years crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2020-08-14 -
2021-08-19
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-06-09 -
2021-06-09
a year crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2020-04-20 -
2022-05-09
2 years crt.sh
www.bing.com
Microsoft RSA TLS CA 02
2020-10-27 -
2021-04-27
6 months crt.sh
*.doubleclick.net
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2021-01-06 -
2021-07-05
6 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
tag.demandbase.com
Go Daddy Secure Certificate Authority - G2
2020-10-14 -
2021-11-15
a year crt.sh
www.googleadservices.com
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
www.google.com
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
www.google.de
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
api.demandbase.com
Go Daddy Secure Certificate Authority - G2
2020-10-09 -
2021-10-28
a year crt.sh
*.company-target.com
Go Daddy Secure Certificate Authority - G2
2019-06-19 -
2021-08-18
2 years crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-14 -
2021-04-23
a year crt.sh
*.google.com
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
*.google.de
GTS CA 1O1
2020-12-15 -
2021-03-09
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-12-22 -
2021-03-21
3 months crt.sh
quora.com
R3
2020-12-27 -
2021-03-27
3 months crt.sh
*.avct.cloud
Let's Encrypt Authority X3
2020-11-03 -
2021-02-01
3 months crt.sh
*.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-12-20 -
2021-02-02
a month crt.sh
*.marketo.net
DigiCert SHA2 Secure Server CA
2020-03-14 -
2021-04-13
a year crt.sh
*.twitter.com
DigiCert TLS RSA SHA256 2020 CA1
2020-11-30 -
2021-11-29
a year crt.sh
*.quora.com
R3
2020-12-27 -
2021-03-27
3 months crt.sh
*.analytics.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-08-01 -
2021-01-28
6 months crt.sh
*.mktoresp.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2022-01-21
2 years crt.sh

This page contains 7 frames:

Primary Page: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Frame ID: E1BCB0A371BE9FB43A6D0CE2D8D244E7
Requests: 124 HTTP requests in this frame

Frame: https://9812475.fls.doubleclick.net/activityi;dc_pre=CLDx1pn-jO4CFXKDgwcdLCYL6g;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F
Frame ID: 295E0DDDD8B382E9872AB4BD68096BE3
Requests: 1 HTTP requests in this frame

Frame: https://5118230.fls.doubleclick.net/activityi;dc_pre=CMq1lpr-jO4CFQXtuwgdZZkOjg;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785
Frame ID: DF314443401F01371742F9A8DAB77B03
Requests: 1 HTTP requests in this frame

Frame: https://insight.adsrvr.org/track/up?adv=8mirph5&ref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&upid=r8yigtp&upv=1.1.0
Frame ID: AE194AA622491449287CACEE63F85E4A
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=46011%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D46011&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&t_e=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&t_d=%0A%09%09%09%09%09Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%09%09%09%09&t_t=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&s_o=default
Frame ID: 47226912DE14ABEF693BCB7F211CDFC1
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=46011%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D46011&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&t_e=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&t_d=%0A%09%09%09%09%09Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%09%09%09%09&t_t=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&s_o=default
Frame ID: 79E48123B48B832766A8D382D41DFA07
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=46011%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D46011&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&t_e=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&t_d=%0A%09%09%09%09%09Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%09%09%09%09&t_t=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&s_o=default
Frame ID: A24BE68F7C56D08EB7BC65BFD5613573
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

130
Requests

99 %
HTTPS

48 %
IPv6

35
Domains

45
Subdomains

45
IPs

8
Countries

4181 kB
Transfer

5332 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 73
  • https://9812475.fls.doubleclick.net/activityi;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F HTTP 302
  • https://9812475.fls.doubleclick.net/activityi;dc_pre=CLDx1pn-jO4CFXKDgwcdLCYL6g;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F
Request Chain 78
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1610131216553&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D2594100%26time%3D1610131216553%26url%3Dhttps%253A%252F%252Fblog.malwarebytes.com%252Fthreat-analysis%252F2021%252F01%252Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%252F%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1610131216553&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&liSync=true
Request Chain 89
  • https://match.prod.bidr.io/cookie-sync/demandbase HTTP 303
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1 HTTP 303
  • https://segments.company-target.com/log?vendor=choca&user_id=AAKY606_8U4AABAfnYSTOw HTTP 303
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AAKY606_8U4AABAfnYSTOw&verifyHash=dc2d0ec6c68540ff8684205dffe7c53ead66dcbb
Request Chain 99
  • https://5118230.fls.doubleclick.net/activityi;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785 HTTP 302
  • https://5118230.fls.doubleclick.net/activityi;dc_pre=CMq1lpr-jO4CFQXtuwgdZZkOjg;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785
Request Chain 103
  • https://ads.avocet.io/s?add=5b8e9b462be173e55d6569fc&ty=j&_=1610131215950 HTTP 301
  • https://ads.avct.cloud/s?r=1&add=5b8e9b462be173e55d6569fc&ty=j&_=1610131215950 HTTP 302
  • https://ads.avct.cloud/s?bounce=true&r=1&add=5b8e9b462be173e55d6569fc&ty=j&_=1610131215950

130 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
124 KB
26 KB
Document
General
Full URL
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx / WP Engine
Resource Hash
9ed14e3a319676c9afbb1b5d736b190eb4c1bd7e2354ed3b8f27fb4f23023455
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:method
GET
:authority
blog.malwarebytes.com
:scheme
https
:path
/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

server
nginx
date
Fri, 08 Jan 2021 18:40:15 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding Accept-Encoding Accept-Encoding,Cookie
x-pingback
https://blog.malwarebytes.com/xmlrpc.php
link
<https://blog.malwarebytes.com/wp-json/>; rel="https://api.w.org/" <https://blog.malwarebytes.com/wp-json/wp/v2/posts/46011>; rel="alternate"; type="application/json" <https://blog.malwarebytes.com/?p=46011>; rel=shortlink
x-powered-by
WP Engine
x-cacheable
SHORT
cache-control
max-age=600, must-revalidate
x-cache
HIT: 21
x-cache-group
normal
x-frame-options
SAMEORIGIN
content-encoding
br
style.min.css
blog.malwarebytes.com/wp-includes/css/dist/block-library/
53 KB
8 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-includes/css/dist/block-library/style.min.css?ver=5.5.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
8c626f0f9b5c109539b256b73e72c02b300a184f46b4535c2eb86599215c78af

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Thu, 27 Aug 2020 18:00:38 GMT
server
nginx
etag
W/"5f47f4c6-d293"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
prettyPhoto.css
blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/assets/prettyphoto/css/
19 KB
3 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/assets/prettyphoto/css/prettyPhoto.css?ver=1.7.2
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1f504f86bc8f301e4041e744f681cce164e9ac5e8e5dfacc984a012e95e1a7cd

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:34 GMT
server
nginx
etag
W/"5a971c6e-4db5"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
css
fonts.googleapis.com/
16 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Source+Sans+Pro%3A300%2C400%2C700%2C300italic%2C400italic%2C700italic%7CBitter%3A400%2C700&subset=latin%2Clatin-ext
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
73a04f6c287a524053674afdf09102545c58f9fba3587fcbe5cc49491b12a0cb
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Fri, 08 Jan 2021 17:42:40 GMT
server
ESF
date
Fri, 08 Jan 2021 18:40:15 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Fri, 08 Jan 2021 18:40:15 GMT
genericons.css
blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/genericons/genericons/
28 KB
16 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/genericons/genericons/genericons.css?ver=3.1
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
4ed10d0d64bb1515397e8666a63f484d640dbc5678fa62574e077b7aef1c3af2

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:31 GMT
server
nginx
etag
W/"5a971c6b-6e6a"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
style.css
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/
92 KB
16 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
2cf0e35caee3dd38226fde6eb30bfbda049d49ce1056009defd33b0243f5d62c

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-16f4a"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery.js
blog.malwarebytes.com/wp-includes/js/jquery/
95 KB
34 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Fri, 17 May 2019 04:25:54 GMT
server
nginx
etag
W/"5cde37d2-17a69"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery.prettyPhoto.js
blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/assets/prettyphoto/js/
37 KB
10 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/assets/prettyphoto/js/jquery.prettyPhoto.js?ver=1.7.2
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
e5087adff56cd9077a7b21a01d78e2a97177cbf4872935bbf3049d06ee884826

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:34 GMT
server
nginx
etag
W/"5a971c6e-94b4"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
front.js
blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/js/
18 KB
4 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/responsive-lightbox/js/front.js?ver=1.7.2
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
95a2c350aabb2955eaaf7a8bbfb494c2533cc20207ac4a026a0100dbac0a554a

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:34 GMT
server
nginx
etag
W/"5a971c6e-4711"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
style.css
www.malwarebytes.com/css/
220 KB
33 KB
Stylesheet
General
Full URL
https://www.malwarebytes.com/css/style.css?12-20-2016
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f39efc86119f8b9af75ddc7622c6dcd63e68a031b4cf170fb024c5430e59981d

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 28 Dec 2020 01:09:51 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:52:40 GMT
server
AmazonS3
age
1013425
etag
W/"404746251a79ce049815ab92db1a1afa"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
x3a6tzsuE12sOL7Ef29e8jeg0Wn7lObRqiTls1nJ5Ps_8KQU30AnpQ==
style.css
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/
92 KB
16 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
2cf0e35caee3dd38226fde6eb30bfbda049d49ce1056009defd33b0243f5d62c

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-16f4a"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery-1.11.3.min.js
www.malwarebytes.com/js/
94 KB
33 KB
Script
General
Full URL
https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ecb916133a9376911f10bc5c659952eb0031e457f5df367cde560edbfba38fb8

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 28 Dec 2020 01:08:21 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:55:04 GMT
server
AmazonS3
age
1013515
etag
W/"895323ed2f7258af4fae2c738c8aea49"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
JqPWJHisFsmOqUG2fX29KsrMokqoHHsOiG4ET6oEHEPNEHiF03kv4A==
9530a107-0af8-4204-a2c2-217efb78222b.js
optanon.blob.core.windows.net/consent/
140 KB
21 KB
Script
General
Full URL
https://optanon.blob.core.windows.net/consent/9530a107-0af8-4204-a2c2-217efb78222b.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.137.4 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
ec442600e3c090c1171e6d0aca38073cc048af3a7a301ec06bf933da6aa65c1b

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Fri, 08 Jan 2021 18:40:15 GMT
Content-Encoding
GZIP
Last-Modified
Wed, 19 Aug 2020 23:29:25 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
NyuiOqvVdJMyWTtUb2ZlDA==
ETag
0x8D84497B6030FBF
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
x-ms-request-id
853216db-d01e-011f-76ed-e545a3000000
Access-Control-Expose-Headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
Cache-Control
public, max-age=14400
x-ms-version
2009-09-19
Content-Length
20591
bootstrap.js
www.malwarebytes.com/js/
67 KB
14 KB
Script
General
Full URL
https://www.malwarebytes.com/js/bootstrap.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
425328ed7a60e35938fa92fc7ba5f5af96b53f9608bb41b8a07c0f91e8bdefcd

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 28 Dec 2020 01:55:13 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:55:03 GMT
server
AmazonS3
age
1010703
etag
W/"94b597fc9b51db7009cdb4425d6b20c7"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
qtA_SFsIyIg_PC-RyJnt1372Fb4ANdckMhKHryQYpV0ofaUopbEavA==
respond.min.js
www.malwarebytes.com/js/ie-fixes/
4 KB
3 KB
Script
General
Full URL
https://www.malwarebytes.com/js/ie-fixes/respond.min.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
75f9768f79e42df5aa6183372a4b067f02682606cca5f242e06d1e07f3614c94

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 08 Dec 2020 20:27:08 GMT
content-encoding
gzip
last-modified
Mon, 07 Dec 2020 17:23:50 GMT
server
AmazonS3
age
2671988
etag
W/"04eff5513cc1ee68d5b0571ef09f4c4c"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
xlAbLBV5rdZYPDBlm2ve8h6mEJCvivCxwcaaJbteDo4wP09PnzT6hw==
modernizr.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/
17 KB
7 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/modernizr.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
da819542692b3f1c2a667ba34eff3465a82d9756953a1446ab7d0772f9b1edd5

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-434b"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
nav-resize.js
www.malwarebytes.com/js/
11 KB
4 KB
Script
General
Full URL
https://www.malwarebytes.com/js/nav-resize.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
527f5743db62b7f9d19fb4b1910eb56d63f76f50b0e0180b63eb67d374642099

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 31 Dec 2020 01:15:16 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:55:04 GMT
server
AmazonS3
age
753900
etag
W/"db669624d8649fe44a8dd0d96dbc6ddd"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
aOvzU4WmDlvjkTum-QlF_-613PT6ybfOClLEzMbbXlfPTFTROtD5WQ==
flexibility.js
www.malwarebytes.com/js/
17 KB
6 KB
Script
General
Full URL
https://www.malwarebytes.com/js/flexibility.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
58c13e24cdfb6384c26836e3eac52d17701cd9d686c56ebf93efbbe9426f8cd6

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 28 Dec 2020 01:09:51 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:55:03 GMT
server
AmazonS3
age
1013425
etag
W/"01076c6ede63d38b66cffca565692a64"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
q9Fn-Wgsja6OHq4PgEHqBEQUnhP08tWwSCLAD3lygu4o7j17fsi3cA==
global.js
www.malwarebytes.com/js/
19 KB
8 KB
Script
General
Full URL
https://www.malwarebytes.com/js/global.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
84415c35f6869b6b17590d6ba8f3115751f14d54adecbb27123008c416e4556d

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 28 Dec 2020 01:41:47 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:55:03 GMT
server
AmazonS3
age
1011509
etag
W/"9dc098a2322aa2bbc4e9329155c2f58e"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
0v0HKBgPUfaWiLgfYvLspyK-s6aJPf5kMmriLNn_Nfb-8xdtCjBDBw==
xs.js
www.malwarebytes.com/js/
9 KB
3 KB
Script
General
Full URL
https://www.malwarebytes.com/js/xs.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a182e45f051c3b540f4e10ea2b38b08db2ba43d38ff33686de11b23e56df7a1b

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 28 Dec 2020 01:08:21 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:55:06 GMT
server
AmazonS3
age
1013515
etag
W/"9096c411f523c580aec8069027170501"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
wgCA5PhPNUYhl6S2WWDQmF9ew0OXIwEk5qox1UAfbMwDwtUla1DDmA==
search.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/
1 KB
712 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/search.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1dc2b8fb26c1a74260a66519a2a5fdf37a938d1b43bbe4d8da7fcd652acc61b9

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-55e"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
NEW-NAV.css
www.malwarebytes.com/css/
22 KB
4 KB
Stylesheet
General
Full URL
https://www.malwarebytes.com/css/NEW-NAV.css
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
72622641b79819e5c8b5c0543d105a45e30f13b1a6c0b5c3701e72de5b57e427

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 31 Dec 2020 01:15:16 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:52:31 GMT
server
AmazonS3
age
753900
etag
W/"c25512dd9326d8c38ecaec1a5bb97b6f"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
jLppxSTeu22Zcfqnr6us4VXuTuwX0Pa4f4b4XnLqrXRWCTJ54Kjo0w==
new-nav.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/
6 KB
2 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/new-nav.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
a2b3f57762f2932505c6fa9b43932cb13856966074febc5bb048052f17100bf6

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-1703"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
search.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/
296 B
438 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/search.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
8f796d398e512c5d19a2fecc943d19a204927ff3cf9ec2cb3f75a025535268cd

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-128"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
shutterstock_1079313176.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
307 KB
307 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/shutterstock_1079313176.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
0833f58d7ac3ceb8dc60a3978ef555853b60373c4a7f77d75e949532a7ce2fa8

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 19:08:24 GMT
server
nginx
etag
"5ff4b928-4ca91"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
314001
wp-emoji-release.min.js
blog.malwarebytes.com/wp-includes/js/
14 KB
5 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-includes/js/wp-emoji-release.min.js?ver=5.5.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
8cb438bd4d1961f80ade4f1a295ca7de253630adcdd10473932908e638908c5e

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 15 Jun 2020 18:04:26 GMT
server
nginx
etag
W/"5ee7b82a-37a6"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
labs-nav.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/
493 B
413 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/labs-nav.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
19333622f176d68bc17e307d8df96b15447864fbb0bbaac495e507fa64d96077

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-1ed"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
contributors.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/
910 B
743 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/contributors.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
6429fe0ed81fca5f6bb18cb0a0aacae3bd9de79192635aeed4cbda438139d75d

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-38e"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
threat-center.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/
2 KB
852 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/threat-center.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
32d4b293bb7f25a21cc44e81184d4bbcb3bdd1837e026b98ed0ad85b3b1a5292

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-812"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
glossary.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/
760 B
654 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/glossary.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
b4e6efb587f3fdfb8155148201d0c51ac95d249a6727e8256acdfe624ade69af

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-2f8"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
scams.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/
842 B
698 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/scams.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
05a173cb58022e81eb499529ac56df6ad7bafe1c61b8128dca8b76f300b5b60e

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-34a"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
write.svg
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/
615 B
585 B
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/images/footer/write.svg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
a6a97c4046257c7e4e063c9f76434c7ce2c1f105e46b07424fabfc054f2d4d24

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-267"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
public, max-age=31536000
jetpack-carousel.css
blog.malwarebytes.com/wp-content/plugins/jetpack/modules/carousel/
25 KB
5 KB
Stylesheet
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/modules/carousel/jetpack-carousel.css?ver=20120629
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
886f70c3e30343eb48a987ba13f995c122f17d8cd5b90094369cbe42924c3e91

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:32 GMT
server
nginx
etag
W/"5a971c6c-6483"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=31536000
comment_count.js
blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/
889 B
620 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/comment_count.js?ver=3.0.12
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
cea0a05c5af6e21a409875328ed2e3dba79131b7c41f8ea07d0e0e02c7b7b59e

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:30 GMT
server
nginx
etag
W/"5a971c6a-379"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
comment_embed.js
blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/
1 KB
686 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/comment_embed.js?ver=3.0.12
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
f055e217bde76d711bd8b42af773f9f99b8a29d81ad9ed10b6379cc7e6c60452

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:30 GMT
server
nginx
etag
W/"5a971c6a-47e"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
devicepx-jetpack.js
s0.wp.com/wp-content/js/
10 KB
3 KB
Script
General
Full URL
https://s0.wp.com/wp-content/js/devicepx-jetpack.js?ver=202101
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
f32d41f2099a0be20e6b57c5e0d1b71c079d3e1345827b0f5c5b97c6e5e3f78d

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT ams 2
date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
server
nginx
etag
W/"58674312-52b6"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=31536000
x-ac
4.ams _dfw
expires
Mon, 03 Jan 2022 14:33:44 GMT
functions.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/
2 KB
1 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/functions.js?ver=2013-07-18
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
9fcb181721162ce0d395b7b9b1e5bb5ca82c5f79bde749d4d0467ec2e65fcb4a

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-8f9"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
wp-embed.min.js
blog.malwarebytes.com/wp-includes/js/
1 KB
951 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-includes/js/wp-embed.min.js?ver=5.5.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
6ebcda7a3a41ef97f0b4071160ceb1020e540fdc0f790079a5c2ef01ab654fe0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Sat, 26 Oct 2019 00:17:07 GMT
server
nginx
etag
W/"5db39083-59a"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
spin.min.js
blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/
4 KB
2 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/spin.min.js?ver=1.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
36e3052355fd8aa03431efa1940b95f1424f6ff56a06d660a1add952c9339861

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:31 GMT
server
nginx
etag
W/"5a971c6b-11aa"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
jquery.spin.min.js
blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/
2 KB
916 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/jquery.spin.min.js?ver=1.3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
b10a8b01476da3fc060041be45e92a42f65c24115f1c64eff444735de47f2a54

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:31 GMT
server
nginx
etag
W/"5a971c6b-70e"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
jetpack-carousel.min.js
blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/carousel/
27 KB
8 KB
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/plugins/jetpack/_inc/build/carousel/jetpack-carousel.min.js?ver=20170209
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
df73bd6bed3e91e18f6100fbfbf4324ec49aadfc49681facb35d700f0f5bb893

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Wed, 28 Feb 2018 21:17:31 GMT
server
nginx
etag
W/"5a971c6b-6da9"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
standard-search-results-footer.js
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/
2 KB
772 B
Script
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/js/standard-search-results-footer.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1532b16aa9cd1fef51c097aaf1abeac6cb6f239b026660e7105e49f4ae6549ff

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
W/"5fa0473a-704"
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
optanon.css
optanon.blob.core.windows.net/skins/6.4.0/default_flat_bottom_two_button_white/v2/css/
23 KB
6 KB
Stylesheet
General
Full URL
https://optanon.blob.core.windows.net/skins/6.4.0/default_flat_bottom_two_button_white/v2/css/optanon.css
Requested by
Host: optanon.blob.core.windows.net
URL: https://optanon.blob.core.windows.net/consent/9530a107-0af8-4204-a2c2-217efb78222b.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.137.4 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
8c20518cd7e51066b82e8a8a1e8035210741cf808c02268915747960f531061c

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Fri, 08 Jan 2021 18:40:15 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Aug 2020 04:48:01 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
E062TbpGx6vwVsuuNM/jFw==
ETag
0x8D83F440F482A65
Content-Type
text/css
Access-Control-Allow-Origin
*
x-ms-request-id
853216f0-d01e-011f-06ed-e545a3000000
Access-Control-Expose-Headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
x-ms-version
2009-09-19
Content-Length
5561
EU
geolocation.onetrust.com/cookieconsentpub/v1/geo/countries/
32 B
404 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/countries/EU?callback=jQuery11130758449319588643_1610131215947&_=1610131215948
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b844 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b0817a0d6a87f2d42532035e42b20ea55cfaa5ca1092c761f5fc5e734790bdbf
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
strict-transport-security
max-age=31536000; includeSubDomains; preload
cf-ray
60e80bc41e634a7f-FRA
content-length
32
cf-request-id
0784e5ae9300004a7f593d3000000001
Locator-Light.woff
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/css/fonts/
29 KB
29 KB
Font
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/css/fonts/Locator-Light.woff
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
ed2491fc7526ff0b5cfec3fe6f4cf8153796520fc845b735286b0f42183da98a

Request headers

Origin
https://blog.malwarebytes.com
Referer
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
"5fa0473a-7330"
vary
Accept-Encoding
content-type
font/woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
29488
gtm.js
www.googletagmanager.com/
252 KB
65 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
0f30a12e966bb8e87f154cf26b7c8ec6cddb300eccee927e19b7b697f4160e09
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
66475
x-xss-protection
0
last-modified
Fri, 08 Jan 2021 18:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Fri, 08 Jan 2021 18:40:16 GMT
Locator-Medium.woff
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/css/fonts/
29 KB
29 KB
Font
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/css/fonts/Locator-Medium.woff
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
a52bbdb7b132e850fdaf5740012fcc0bc3f6ef0be520bc4b987d8761d40d015a

Request headers

Origin
https://blog.malwarebytes.com
Referer
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
"5fa0473a-734c"
vary
Accept-Encoding
content-type
font/woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
29516
Locator-LightItalic.woff
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/css/fonts/
30 KB
30 KB
Font
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/css/fonts/Locator-LightItalic.woff
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
ad2cc26b0fdde8f4eb637ed12b25364e85af0bfba227dad42cb997ff4ad23eeb

Request headers

Origin
https://blog.malwarebytes.com
Referer
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
"5fa0473a-7888"
vary
Accept-Encoding
content-type
font/woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
30856
socicon.woff
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/css/fonts/
20 KB
20 KB
Font
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/css/fonts/socicon.woff
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
0ed37960a59a6ec6b443f9ef043864d09a51db6fd276ae578d9166467bf986d1

Request headers

Origin
https://blog.malwarebytes.com
Referer
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/style.css?ver=2013-07-18
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Mon, 02 Nov 2020 17:51:54 GMT
server
nginx
etag
"5fa0473a-4ff8"
vary
Accept-Encoding
content-type
font/woff
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
20472
apt37-doc.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
80 KB
80 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/apt37-doc.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
16f6f839f6a5e2456a77f213b1c68c8633117d64482edcca5393c3ff64c07525

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:54:52 GMT
server
nginx
etag
"5ff4d21c-13e6a"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
81514
self.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
50 KB
50 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/self.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
cb1463a664917950d3550c7e0433f833a673bbea4765a4cf9ff346e74bca3b29

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Wed, 06 Jan 2021 00:38:53 GMT
server
nginx
etag
"5ff5069d-c707"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
50951
pat37-macro1.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
80 KB
80 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/pat37-macro1.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
1e476f759fd905f4aa1a328caf32f7ae105a8dfdb74a24d416499e13b5a18429

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:56:04 GMT
server
nginx
etag
"5ff4d264-13f00"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
81664
apt37-loj.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
33 KB
34 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/apt37-loj.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
647ba9d5828e6f5be20dccd9e0fd0917c8b57552f15fd386fc3b4430a4a898a9

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:56:41 GMT
server
nginx
etag
"5ff4d289-85de"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
34270
vbom.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
52 KB
52 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/vbom.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
61f32dcb948dd6f22cec9deb5be4b1c4e738bf3d6c7da63a37fc4efe15217e3e

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:57:14 GMT
server
nginx
etag
"5ff4d2aa-ceb7"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
52919
mutex.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
30 KB
30 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/mutex.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
ce1c6adb5ac54f49964cecbf628ce8f9b188a45e2ddb8461e1cc0e1bc7e8ecdd

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:57:49 GMT
server
nginx
etag
"5ff4d2cd-76e6"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
30438
selfopen.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
26 KB
26 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/selfopen.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
c9a0bc0b7b5a9e288ead7cfe1acbfdf0a4cbb1094270a3cc34f4d2c22cfeec26

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:58:14 GMT
server
nginx
etag
"5ff4d2e6-6761"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
26465
obfuscated-macro.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
729 KB
730 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/obfuscated-macro.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
56a99b1849e9cd1cbc62b1dddc089ce53e99ea65a30c6134961d34a3df0c8255

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:58:37 GMT
server
nginx
etag
"5ff4d2fd-b6208"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
745992
deobfuscator.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
107 KB
107 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/deobfuscator.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
7b4e202117a2e90d1b084e6c7fbdef9f15605d0a228b1bb1292b590c28588a64

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:58:59 GMT
server
nginx
etag
"5ff4d313-1abb5"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
109493
loop.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
126 KB
126 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/loop.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
febf60520ecd81f5685c851c0950ae2ee8696b39c82f5f3539fd05527c18200f

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:59:28 GMT
server
nginx
etag
"5ff4d330-1f6c0"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
128704
final-macro.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
683 KB
684 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/final-macro.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
f4f3ad0ce265b88fcc88107fe73a4e7e78cb28308b0cd7a14bde363d9a52e08f

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 20:59:58 GMT
server
nginx
etag
"5ff4d34e-aad2d"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
699693
bit.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
130 KB
130 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/bit.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
f681f2a3ebbfca40903dac86ce421cf85dfb67a6edd39feb871481b65fdf7357

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Thu, 07 Jan 2021 01:49:42 GMT
server
nginx
etag
"5ff668b6-207ee"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
133102
cloud.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
100 KB
100 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/cloud.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
0d12c5bd9e73a021c1e70449af638d9434e41a46fa6be814186ab5aaf055f729

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 21:00:26 GMT
server
nginx
etag
"5ff4d36a-18f45"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
102213
anti-analysis.jpg
blog.malwarebytes.com/wp-content/uploads/2021/01/
86 KB
86 KB
Image
General
Full URL
https://blog.malwarebytes.com/wp-content/uploads/2021/01/anti-analysis.jpg
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx /
Resource Hash
462047d677853e22dc6e4deee52a0466317924c866e7f1a6e1b827a48569e2d8

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Tue, 05 Jan 2021 21:00:51 GMT
server
nginx
etag
"5ff4d383-157b2"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
87986
147cd7280d6ece931e4488a3a10809d9
secure.gravatar.com/avatar/
11 KB
11 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/147cd7280d6ece931e4488a3a10809d9?s=96&d=identicon&r=g
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
1f462c2a1a60b244e8901d78293b03c6f554ea0364b57e7412550cd842484b90

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT hhn 1
date
Fri, 08 Jan 2021 18:40:16 GMT
last-modified
Thu, 18 Jul 2019 15:17:37 GMT
server
nginx
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=300
content-disposition
inline; filename="147cd7280d6ece931e4488a3a10809d9.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/147cd7280d6ece931e4488a3a10809d9?s=96&d=identicon&r=g>; rel="canonical"
content-length
11084
expires
Fri, 08 Jan 2021 18:45:16 GMT
analytics.js
www.google-analytics.com/
46 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e441c3e2771625ba05630ab464275136a82c99650ee2145ca5aa9853bedeb01b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 23 Oct 2020 03:00:57 GMT
server
Golfe2
age
4115
date
Fri, 08 Jan 2021 17:31:41 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18817
expires
Fri, 08 Jan 2021 19:31:41 GMT
insight.min.js
snap.licdn.com/li.lms-analytics/
4 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:296::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
5f3b103a1268f862a5e432d607f8e5220dea9d301d13565b0ecded3ad9c25ab2

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:16 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Jan 2021 22:14:03 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=65590
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1855
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.136.157 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
4cf52cc73734aa71f26f6a10be9aeec89602af45bf0f9abd5c8445a076c1ae1a

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
via
1.1 varnish
last-modified
Fri, 04 Dec 2020 00:21:46 GMT
age
76032
etag
"cbc512946c8abb461c6215ed5b454e5f+gzip"
vary
Accept-Encoding,Host
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
content-encoding
gzip
cache-control
no-cache
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
content-length
1957
x-timer
S1610131216.243647,VS0,VE0
x-served-by
cache-hhn11526-HHN
2893.js
script.crazyegg.com/pages/scripts/0081/
4 KB
2 KB
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0081/2893.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
641f746d21f512edf7f0efd3723958e25785d0d3118b655cf04c1518d0f2f570

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
cf-cache-status
HIT
age
152
cf-polished
origSize=4004
ce-version
11.1.190
cf-request-id
0784e5af2b000097ea1d9fe000000001
timing-allow-origin
*
last-modified
Fri, 08 Jan 2021 18:37:44 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
cf-ray
60e80bc51b3f97ea-FRA
cf-bgj
minify
count.js
malwarebytesunpacked.disqus.com/
1 KB
2 KB
Script
General
Full URL
https://malwarebytesunpacked.disqus.com/count.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/comment_count.js?ver=3.0.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:16 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
2321715
P3P
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Content-Length
871
X-XSS-Protection
1; mode=block
Last-Modified
Wed, 09 Dec 2020 18:12:43 GMT
Server
nginx
ETag
"5fd1139b-367"
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
DFW3-C1
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
X-Amz-Cf-Id
JUfRxlJlv8q-fLNoob36m0nIH8jS5R542ExXm0l3zau-Bw7dqNb7gA==
embed.js
malwarebytesunpacked.disqus.com/
72 KB
24 KB
Script
General
Full URL
https://malwarebytesunpacked.disqus.com/embed.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/wp-content/plugins/disqus-comment-system/public/js/comment_embed.js?ver=3.0.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
35c9eac87d8eb24e798c1cb3f0d81a1b7aaf76c16ade420eae02bfcf2177b692
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
23914
wai.gif
genesis.malwarebytes.com/api/v1/
338 B
560 B
XHR
General
Full URL
https://genesis.malwarebytes.com/api/v1/wai.gif
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1f18:21ae:6700:958f:43e8:31e6:f032 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0b1e3ca440f9c4ef9b1d4c83d77ffb34c977cc98765770f6e5ee608512ddea03

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

access-control-allow-origin
*
date
Fri, 08 Jan 2021 18:40:16 GMT
access-control-allow-credentials
true
server
Apache-Coyote/1.1
access-control-allow-headers
origin, content-type, accept, authorization
access-control-allow-methods
GET, POST
content-type
application/json
pillarpages.json
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/
24 KB
6 KB
XHR
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/pillarpages.json
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx / WP Engine
Resource Hash
e3597d2c956d2766eb20a84f1de23f99211a4778ddfec91d82c4182404357ffb
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding,Cookie
last-modified
Fri, 08 Jan 2021 18:38:28 GMT
server
nginx
x-cacheable
SHORT
x-powered-by
WP Engine
etag
W/"60f9-5b867dcc6313b"
x-frame-options
SAMEORIGIN
x-cache
HIT: 34
content-type
application/json
cache-control
max-age=600, must-revalidate
x-cache-group
normal
intl-sites.json
blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/
890 B
600 B
XHR
General
Full URL
https://blog.malwarebytes.com/wp-content/themes/labs.malwarebytes.org-3.5.2/intl-sites.json
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
130.211.198.3 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
3.198.211.130.bc.googleusercontent.com
Software
nginx / WP Engine
Resource Hash
728054ccf1f41ec0afdb688b6db421601bb60d505d9e1e2c2de16d9e4a14b774
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept-Encoding, Accept-Encoding,Cookie
last-modified
Fri, 08 Jan 2021 18:38:28 GMT
server
nginx
x-cacheable
SHORT
x-powered-by
WP Engine
etag
W/"37a-5b867dcc6ecc1"
x-frame-options
SAMEORIGIN
x-cache
HIT: 34
content-type
application/json
cache-control
max-age=600, must-revalidate
x-cache-group
normal
bat.js
bat.bing.com/
27 KB
8 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
4dd6c09ddcb0e53a6290cc1df35224856073ba5f89d4134bd7c69e4fd9c6f515

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:15 GMT
content-encoding
gzip
last-modified
Tue, 20 Oct 2020 22:19:32 GMT
x-msedge-ref
Ref A: 968D8EF95E424A0D89376460BA417EB8 Ref B: FRAEDGE1421 Ref C: 2021-01-08T18:40:16Z
etag
"0b27f152fa7d61:0"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
8454
activityi;dc_pre=CLDx1pn-jO4CFXKDgwcdLCYL6g;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-an...
9812475.fls.doubleclick.net/ Frame 295E
Redirect Chain
  • https://9812475.fls.doubleclick.net/activityi;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-...
  • https://9812475.fls.doubleclick.net/activityi;dc_pre=CLDx1pn-jO4CFXKDgwcdLCYL6g;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F...
0
0
Document
General
Full URL
https://9812475.fls.doubleclick.net/activityi;dc_pre=CLDx1pn-jO4CFXKDgwcdLCYL6g;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F?
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
172.217.18.166 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s29-in-f6.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=21600
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
9812475.fls.doubleclick.net
:scheme
https
:path
/activityi;dc_pre=CLDx1pn-jO4CFXKDgwcdLCYL6g;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
about:blank

Response headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Fri, 08 Jan 2021 18:40:16 GMT
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
strict-transport-security
max-age=21600
content-type
text/html; charset=UTF-8
pragma
no-cache
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
467
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Fri, 08-Jan-2021 18:55:16 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"

Redirect headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Fri, 08 Jan 2021 18:40:16 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
strict-transport-security
max-age=21600
location
https://9812475.fls.doubleclick.net/activityi;dc_pre=CLDx1pn-jO4CFXKDgwcdLCYL6g;src=9812475;type=conve0;cat=forms000;ord=1;num=9038305321494;gtm=2wgbu0;auiddc=476608955.1610131217;~oref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F?
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
server
cafe
content-length
0
x-xss-protection
0
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
js
www.googletagmanager.com/gtag/
96 KB
38 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=AW-930356311
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:825::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
b4e400664f87474a97ee0cab804ba76a70537d95030b645c42d68056d5d7dec5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38968
x-xss-protection
0
last-modified
Fri, 08 Jan 2021 18:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Fri, 08 Jan 2021 18:40:16 GMT
up_loader.1.1.0.js
js.adsrvr.org/
4 KB
2 KB
Script
General
Full URL
https://js.adsrvr.org/up_loader.1.1.0.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.100.124 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-100-124.zrh50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ee3a7301fe1e0c0f6bf6acff0d7a8d107f5cb3f62a2566740c0416d8e61f00b9

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Thu, 07 Jan 2021 21:10:39 GMT
Content-Encoding
gzip
Last-Modified
Thu, 24 Sep 2020 15:15:34 GMT
Server
AmazonS3
Age
77377
ETag
W/"98d98b3499058b76d58073cf8ede2f10"
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 c202f63846a430afd2d556266be8b50c.cloudfront.net (CloudFront)
Connection
keep-alive
Transfer-Encoding
chunked
X-Amz-Cf-Pop
ZRH50-C1
X-Amz-Cf-Id
S1YoZhgSgVLqc5839yzbZ3-6Vq3s_G1fXovq1OWz_wVZmzBBQoEreQ==
demandbase-forms.js
www.malwarebytes.com/js/
3 KB
1 KB
Script
General
Full URL
https://www.malwarebytes.com/js/demandbase-forms.js?d=2020-02-04-15-03-08--0800
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:b400:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5576e25dd8a4d45e90da43e0f127c4efb4d16eebcb7a1bc55fbb66e7cf504f9d

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 31 Dec 2020 01:13:29 GMT
content-encoding
gzip
last-modified
Tue, 22 Dec 2020 22:55:03 GMT
server
AmazonS3
age
754008
etag
W/"cb45a71066aa90353febec3e66fe17d4"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8455bcb2c0203b0c4ee93b610d75e69b.cloudfront.net (CloudFront)
cache-control
private, max-age=31536000, immutable
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
C6bZUBOfOH26eT60P8BuE_3uVpICda8i1oN_ifiT1jX6s63BpZ1BkA==
collect
www.google-analytics.com/j/
4 B
74 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j87&a=431715694&t=pageview&_s=1&dl=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&ul=en-us&de=UTF-8&dt=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEABAAAAAC~&jid=471124784&gjid=1299241105&cid=1039056146.1610131217&tid=UA-3347303-10&_gid=326590158.1610131217&_r=1&_slc=1&z=157056983
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
aec60bc104db041b1512185839f18f52986df7e569e5445f740dd60f763fbca8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Fri, 08 Jan 2021 18:40:16 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://blog.malwarebytes.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1610131216553&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-se...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D2594100%26time%3D1610131216553%26url%3Dhttps%253A%252F%252Fblog.malwarebytes.com%...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1610131216553&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-se...
0
61 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1610131216553&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&liSync=true
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
server
Play
linkedin-action
1
x-li-fabric
prod-lva1
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
0
x-li-uuid
Nzjqkc9VWBaAQEMf2ioAAA==

Redirect headers

content-security-policy
default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id lnkd.demdex.net blob: https://accounts.google.com/gsi/status https://linkedin.sc.omtrdc.net/b/ss/ www.google-analytics.com static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/ platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-content-type-options
nosniff
linkedin-action
1
content-length
0
x-li-uuid
aGOfjc9VWBZwG7bBaSsAAA==
pragma
no-cache
x-li-pop
afd-prod-lva1
x-msedge-ref
Ref A: 09D32C5DE58B408B96EE74801BB7491D Ref B: FRAEDGE0717 Ref C: 2021-01-08T18:40:16Z
x-frame-options
sameorigin
date
Fri, 08 Jan 2021 18:40:16 GMT
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1610131216553&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
2893.json
script.crazyegg.com/pages/data-scripts/0081/
3 KB
1 KB
XHR
General
Full URL
https://script.crazyegg.com/pages/data-scripts/0081/2893.json?t=5367104
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/scripts/0081/2893.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
11792ee94eabb4479ddea966d882404abd14cba1e2bee3fe65bbdfe972b2f639

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
cf-cache-status
HIT
age
152
ce-version
11.1.190
content-length
965
cf-request-id
0784e5b0c60000c2b8b41fa000000001
timing-allow-origin
*
last-modified
Fri, 08 Jan 2021 18:37:44 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
accept-ranges
bytes
cf-ray
60e80bc7aad0c2b8-FRA
collect
stats.g.doubleclick.net/j/
4 B
92 B
XHR
General
Full URL
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j87&tid=UA-3347303-10&cid=1039056146.1610131217&jid=471124784&gjid=1299241105&_gid=326590158.1610131217&_u=IEBAAEAAAAAAAC~&z=1542740756
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9a Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
84e01419bd81f32ac6df0f75f49c604fda9172000a3ae432b3c47b2a6a712d80
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Fri, 08 Jan 2021 18:40:16 GMT
content-type
text/plain
access-control-allow-origin
https://blog.malwarebytes.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
adsct
t.co/i/
43 B
448 B
Image
General
Full URL
https://t.co/i/adsct?type=javascript&version=1.1.1&p_id=Twitter&p_user_id=0&txn_id=o1m5j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tw_document_href=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
114
pragma
no-cache
last-modified
Fri, 08 Jan 2021 18:40:16 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
df1648869a24927792ed41487c6f4cf6
x-transaction
004d04c200659d0c
expires
Tue, 31 Mar 1981 05:00:00 GMT
HWyTnY16.min.js
scripts.demandbase.com/
60 KB
16 KB
Script
General
Full URL
https://scripts.demandbase.com/HWyTnY16.min.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
52.85.115.13 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-52-85-115-13.hel50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
16f961e4eedc84409f706d7043ec879d9a7783c6f317640b0d97a73e98e9e8ea

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
IE5IzYwU4gx7oNbzFWwbL4ZS6nSJjwBv
content-encoding
gzip
last-modified
Tue, 08 Dec 2020 23:24:47 GMT
server
AmazonS3
age
129
etag
W/"c890c8c9866d4d0ee9b287e7db203091"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
via
1.1 3fcabc15a7f22952dcacfedd3d2b6a15.cloudfront.net (CloudFront)
cache-control
public, max-age=3600
date
Fri, 08 Jan 2021 18:38:09 GMT
x-amz-cf-pop
HEL50-C2
x-amz-cf-id
O4DFvDboYS00SZ4_FE3QLwjsB-zXLW-oTx9ULlgGyeRuBNgkgi7RCw==
0
bat.bing.com/action/
0
93 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=4072696&Ver=2&mid=08c87f36-8a47-499c-ad00-c92c227e9f63&sid=f391c27051e011ebb846eb0f19aeb828&vid=f391fe7051e011eba2010b9c01ced5ed&vids=1&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&p=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&r=&lt=1332&evt=pageLoad&msclkid=N&sv=1&rn=900019
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

access-control-allow-origin
*
pragma
no-cache
date
Fri, 08 Jan 2021 18:40:15 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: CD873653B93B4A44834CE6CB0F8602D4 Ref B: FRAEDGE1421 Ref C: 2021-01-08T18:40:16Z
expires
Fri, 01 Jan 1990 00:00:00 GMT
conversion_async.js
www.googleadservices.com/pagead/
30 KB
13 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion_async.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=AW-930356311
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s17-in-f2.1e100.net
Software
cafe /
Resource Hash
e1ec254792b6fe5cb168d2ce9cb1e35d15311d3b357b305a95cbfb12552477d0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
12175
x-xss-protection
0
server
cafe
etag
17536051821503146167
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Fri, 08 Jan 2021 18:40:16 GMT
ga-audiences
www.google.com/ads/
42 B
107 B
Image
General
Full URL
https://www.google.com/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j87&tid=UA-3347303-10&cid=1039056146.1610131217&jid=471124784&_u=IEBAAEAAAAAAAC~&z=1314157489
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 08 Jan 2021 18:40:16 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
42 B
107 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j87&tid=UA-3347303-10&cid=1039056146.1610131217&jid=471124784&_u=IEBAAEAAAAAAAC~&z=1314157489
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 08 Jan 2021 18:40:16 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
11.1.190.js
script.crazyegg.com/pages/versioned/common-scripts/
101 KB
33 KB
Script
General
Full URL
https://script.crazyegg.com/pages/versioned/common-scripts/11.1.190.js
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/scripts/0081/2893.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7ad834ded0e2943ffc01213c547a992a79604a5b0e8c118dafd1b062ca9cfeda

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
cf-cache-status
HIT
age
165
cf-polished
origSize=107931
cf-ray
60e80bc7cd1e97ea-FRA
cf-request-id
0784e5b0de000097ea1da17000000001
last-modified
Tue, 05 Jan 2021 19:28:11 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000, s-maxage=31536000
timing-allow-origin
*
cf-bgj
minify
ip.json
api.company-target.com/api/v2/
436 B
943 B
XHR
General
Full URL
https://api.company-target.com/api/v2/ip.json?referrer=&page=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&page_title=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&src=tag&key=5527c2aa519592df7d44a24d0105731b
Requested by
Host: scripts.demandbase.com
URL: https://scripts.demandbase.com/HWyTnY16.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.224.94.61 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-94-61.zrh50.r.cloudfront.net
Software
nginx /
Resource Hash
43424d26c588fc0d2f8cac6f25354a061a60683b3a8c535fed092795e903c75c

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
identification-source
CENTRAL
vary
Accept-Encoding, Origin
x-amz-cf-pop
ZRH50-C1
x-cache
Miss from cloudfront
request-id
db3108c3-668d-4f34-b62b-f47bed0fb0a4
content-encoding
gzip
pragma
no-cache
access-control-allow-origin
https://blog.malwarebytes.com
server
nginx
access-control-max-age
7200
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/json;charset=utf-8
via
1.1 792f70324a941726ce7e749514e6fc3c.cloudfront.net (CloudFront)
access-control-expose-headers
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
api-version
v2
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
x-amz-cf-id
Cf4d-GPHo_ExBmPunODvhEa0aTAD-Q4V8X_0AiyeSQ7RbqhJXJY6JA==
expires
Thu, 07 Jan 2021 18:40:16 GMT
validateCookie
segments.company-target.com/
Redirect Chain
  • https://match.prod.bidr.io/cookie-sync/demandbase
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1
  • https://segments.company-target.com/log?vendor=choca&user_id=AAKY606_8U4AABAfnYSTOw
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AAKY606_8U4AABAfnYSTOw&verifyHash=dc2d0ec6c68540ff8684205dffe7c53ead66dcbb
26 B
409 B
Image
General
Full URL
https://segments.company-target.com/validateCookie?vendor=choca&user_id=AAKY606_8U4AABAfnYSTOw&verifyHash=dc2d0ec6c68540ff8684205dffe7c53ead66dcbb
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.94.99 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-94-99.zrh50.r.cloudfront.net
Software
/
Resource Hash
3b7b8a4b411ddf8db9bacc2f3aabf406f8e4c0c087829b336ca331c40adfdff1

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
Via
1.1 9c70db7b93d63d4e23f775d04664db64.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
ZRH50-C1
Vary
Origin
X-Cache
Miss from cloudfront
Content-Type
image/gif
Transfer-Encoding
chunked
Connection
keep-alive
trace-id
b9ccc2b29dedd104
X-Amz-Cf-Id
38xXWa5uDnVq84zDDuzUxufiibuBuBXUx2N0XGkkCyUUXP2cH3AUag==

Redirect headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
Via
1.1 9c70db7b93d63d4e23f775d04664db64.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
ZRH50-C1
Vary
Origin
X-Cache
Miss from cloudfront
Location
/validateCookie?vendor=choca&user_id=AAKY606_8U4AABAfnYSTOw&verifyHash=dc2d0ec6c68540ff8684205dffe7c53ead66dcbb
Connection
keep-alive
trace-id
adc81d8e8711a425
Content-Length
0
X-Amz-Cf-Id
f2oKrgSFD8ERYXP1bp-QfST2pdILv5P-FCpyG7I-AM4UJZqYB3T_3Q==
464526.gif
id.rlcdn.com/
0
66 B
Image
General
Full URL
https://id.rlcdn.com/464526.gif
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.120.207.148 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
148.207.120.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:16 GMT
via
1.1 google
alt-svc
clear
content-length
0
/
googleads.g.doubleclick.net/pagead/viewthroughconversion/930356311/
3 KB
1 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/930356311/?random=1610131216782&cv=9&fst=1610131216782&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&gtm=2oabu0&sendb=1&ig=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&tiba=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion_async.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0309398a1997bc2fa2baee5d12c235a7526f2ef64e5e6aa9715fd067c0238717
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 08 Jan 2021 18:40:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051="googleads.g.doubleclick.net:443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
1162
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.com/pagead/1p-user-list/930356311/
42 B
318 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/930356311/?random=1610131216782&cv=9&fst=1610128800000&num=1&bg=ffffff&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&gtm=2oabu0&sendb=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&tiba=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&async=1&fmt=3&is_vtc=1&random=1858056152&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 08 Jan 2021 18:40:16 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/930356311/
42 B
530 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/930356311/?random=1610131216782&cv=9&fst=1610128800000&num=1&bg=ffffff&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&gtm=2oabu0&sendb=1&data=event%3Dgtag.config&frm=0&url=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&tiba=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&async=1&fmt=3&is_vtc=1&random=1858056152&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 08 Jan 2021 18:40:16 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
63 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j87&a=431715694&t=event&ni=1&_s=2&dl=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&ul=en-us&de=UTF-8&dt=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Demandbase&ea=API%20Resolution&el=IP%20API&_u=aHBAAEABAAAAAC~&jid=&gjid=&cid=1039056146.1610131217&tid=UA-3347303-10&_gid=326590158.1610131217&cd2=(Non-Company%20Visitor)&cd3=Bot&cd4=(Non-Company%20Visitor)&cd5=(Non-Company%20Visitor)&cd6=(Non-Company%20Visitor)&cd7=(Non-Company%20Visitor)&cd8=(Non-Company%20Visitor)&cd9=(Non-Company%20Visitor)&cd10=(Non-Company%20Visitor)&cd11=Copenhagen&cd12=84&cd13=(Non-Company%20Visitor)&cd14=(Non-Company%20Visitor)&cd15=(Non-Company%20Visitor)&cd16=(Non-Company%20Visitor)&cd17=DK&cd18=(Non-Company%20Visitor)&z=1705168917
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:801::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 08 Jan 2021 13:49:13 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
17463
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
lounge.93b42de3124a0dd0533f88d602ff11e8.css
c.disquscdn.com/next/embed/styles/
0
22 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.93b42de3124a0dd0533f88d602ff11e8.css
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168715
strict-transport-security
max-age=300; includeSubdomains
content-length
22661
cf-request-id
0784e5b4810000177a46af2000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-5885"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bcd9fc0177a-FRA
x-amz-cf-id
FoLAKKYeyCVOQCHjxkf648euNl2eE6RaXpXOfpVsO0oF_J48wSAC-w==
expires
Thu, 06 Jan 2022 19:48:21 GMT
common.bundle.de93b98d666f8e6c7505f802a907a867.js
c.disquscdn.com/next/embed/
0
93 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.de93b98d666f8e6c7505f802a907a867.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168716
strict-transport-security
max-age=300; includeSubdomains
content-length
94780
cf-request-id
0784e5b4810000177a10a7e000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-1723c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bcd9fc3177a-FRA
x-amz-cf-id
Qu4oNWqpLJ8y9PXfL-VGAE9V9ADfjzDcz1G_P1sBId44bHg1MBhBvA==
expires
Thu, 06 Jan 2022 19:48:21 GMT
lounge.bundle.b00141b8e7a9878087e2d84485476038.js
c.disquscdn.com/next/embed/
0
114 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.b00141b8e7a9878087e2d84485476038.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168715
strict-transport-security
max-age=300; includeSubdomains
content-length
116447
cf-request-id
0784e5b4840000177a3e901000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-1c6df"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bcd9fc7177a-FRA
x-amz-cf-id
Yc_MGoCjsBblRoSjmjt3J9uZx4r3PRNlMryaeVdCaHO4-zgHDDy4oQ==
expires
Thu, 06 Jan 2022 19:48:21 GMT
config.js
disqus.com/next/
0
10 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
X-Content-Type-Options
nosniff
Content-Type
application/javascript; charset=UTF-8
Server
nginx
Age
32
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
9280
X-XSS-Protection
1; mode=block
activityi;dc_pre=CMq1lpr-jO4CFQXtuwgdZZkOjg;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785
5118230.fls.doubleclick.net/ Frame DF31
Redirect Chain
  • https://5118230.fls.doubleclick.net/activityi;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785?
  • https://5118230.fls.doubleclick.net/activityi;dc_pre=CMq1lpr-jO4CFQXtuwgdZZkOjg;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785?
0
0
Document
General
Full URL
https://5118230.fls.doubleclick.net/activityi;dc_pre=CMq1lpr-jO4CFQXtuwgdZZkOjg;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785?
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
216.58.205.230 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s24-in-f6.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=21600
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
5118230.fls.doubleclick.net
:scheme
https
:path
/activityi;dc_pre=CMq1lpr-jO4CFQXtuwgdZZkOjg;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/

Response headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Fri, 08 Jan 2021 18:40:17 GMT
expires
Fri, 08 Jan 2021 18:40:17 GMT
cache-control
private, max-age=0
strict-transport-security
max-age=21600
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
377
x-xss-protection
0
set-cookie
IDE=AHWqTUmlzdAsoowKwxIMTuOQ_iQz0CyOx_UFV5Ynyfoj9pCUQuxfLyo8ascGEZpQ; expires=Wed, 02-Feb-2022 18:40:17 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"

Redirect headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Fri, 08 Jan 2021 18:40:17 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
strict-transport-security
max-age=21600
location
https://5118230.fls.doubleclick.net/activityi;dc_pre=CMq1lpr-jO4CFQXtuwgdZZkOjg;src=5118230;type=count0;cat=secur00;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;ord=1;num=7764038699193.785?
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
server
cafe
content-length
0
x-xss-protection
0
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
embed.js
malwarebytesunpacked.disqus.com/
72 KB
24 KB
Script
General
Full URL
https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215949
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
8796c7e1a5f1e42993b13906d3ce8db14c1e98623ee1b45cd7e766e386be6077
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:18 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
23914
fbevents.js
connect.facebook.net/en_US/
90 KB
23 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
a8755954660f9bef43d2dc61d725f022a3115b81ae76a6af093ab18cfdfa5de7
Security Headers
Name Value
Content-Security-Policy default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c;
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
0
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
23366
x-fb-rlafr
0
pragma
public
x-fb-debug
OFRkorqpDo9jjy3QEqGFYYtBB6ZTVz/zkwKRSasT9rWAEwFBrwUATjyneql+YvhL3xx1JXE7zY9bgBRPG7vlnw==
x-fb-trip-id
1814657579
x-frame-options
DENY
date
Fri, 08 Jan 2021 18:40:17 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
expires
Sat, 01 Jan 2000 00:00:00 GMT
qevents.js
a.quora.com/
39 KB
14 KB
Script
General
Full URL
https://a.quora.com/qevents.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.13.2 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ef6de6beb1cf5bf809eccfe10f99aea0e0969c71d4eab5446410fef72695679f

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
s3LlaOWABX1LUjiLldBNr49lVAylKDRo
content-encoding
gzip
etag
"f32ebb1e93a72c0a57add6d07f688510"
age
4499
x-cache
HIT, HIT
content-length
13681
x-amz-id-2
Eq/bZjlh5LsZzS4XdXhhBSXaXzFf/PhDr+dWOr6u4bu4amexUVNdJzTjTReY+zmsb46KPBEym+w=
x-served-by
cache-bwi5133-BWI, cache-fra19168-FRA
last-modified
Fri, 25 Oct 2019 19:28:38 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1572031715/ctime:1572031714/gid:1000000/gname:employee/md5:f32ebb1e93a72c0a57add6d07f688510/mode:33188/mtime:1149709104/uid:1000332/uname:tzhou
x-timer
S1610131218.620402,VS0,VE0
date
Fri, 08 Jan 2021 18:40:17 GMT
vary
Accept-Encoding
x-amz-request-id
907013783F6B3181
via
1.1 varnish, 1.1 varnish
cache-control
max-age=7200
accept-ranges
bytes
content-type
text/plain
x-cache-hits
1, 674
s
ads.avct.cloud/
Redirect Chain
  • https://ads.avocet.io/s?add=5b8e9b462be173e55d6569fc&ty=j&_=1610131215950
  • https://ads.avct.cloud/s?r=1&add=5b8e9b462be173e55d6569fc&ty=j&_=1610131215950
  • https://ads.avct.cloud/s?bounce=true&r=1&add=5b8e9b462be173e55d6569fc&ty=j&_=1610131215950
0
336 B
Script
General
Full URL
https://ads.avct.cloud/s?bounce=true&r=1&add=5b8e9b462be173e55d6569fc&ty=j&_=1610131215950
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
54.194.211.3 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-194-211-3.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
p3p
policyref="http://cdn.avocet.io/w3c/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
content-length
0
content-type
application/javascript

Redirect headers

location
/s?bounce=true&r=1&add=5b8e9b462be173e55d6569fc&ty=j&_=1610131215950
date
Fri, 08 Jan 2021 18:40:17 GMT
p3p
policyref="http://cdn.avocet.io/w3c/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
content-length
107
content-type
text/html; charset=utf-8
ytc.js
s.yimg.com/wi/
15 KB
6 KB
Script
General
Full URL
https://s.yimg.com/wi/ytc.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1288:f03d:1fa::4000 , United Kingdom, ASN10310 (YAHOO-1, US),
Reverse DNS
Software
ATS /
Resource Hash
63896532a7015ab5b7288359c02124980a5075e9267f0ba3fbfc7c3f5038b478
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

ats-carp-promotion
1
date
Fri, 08 Jan 2021 17:43:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
3424
x-amz-server-side-encryption
AES256
vary
Origin, Accept-Encoding
content-length
5581
x-amz-id-2
5L+f/83kek52VkhUcT3ntbpGrUHwjSc1N4t4jcG5TPueFdWJF6QE0B1/lMwN+MmCcEgAu4PlecY=
referrer-policy
no-referrer-when-downgrade
x-amz-expiration
expiry-date="Sat, 30 Oct 2021 00:00:00 GMT", rule-id="oath-standard-lifecycle"
last-modified
Thu, 24 Sep 2020 23:08:16 GMT
server
ATS
etag
"49db10c8315384e8dad2e92a6841ed81-df"
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=15552000
x-amz-request-id
38A6DB0C7AE01C19
x-xss-protection
1; mode=block
cache-control
public,max-age=3600
x-amz-version-id
swANRqp_TdPZf97XDKuCKoVnrp7c.h.0
accept-ranges
bytes
content-type
application/javascript
munchkin.js
munchkin.marketo.net/
1 KB
1 KB
Script
General
Full URL
https://munchkin.marketo.net/munchkin.js
Requested by
Host: blog.malwarebytes.com
URL: https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.236.192 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-236-192.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
5cc2628039ee08964a5f46fb8abb1d5e1ec87e1200d12862ef1232bbfed7da55

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
Content-Encoding
gzip
Last-Modified
Wed, 05 Aug 2020 03:11:00 GMT
Server
AkamaiNetStorage
ETag
"a67ed8ce0a86706b9f73a86806ce5bd3:1596597060.25158"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
752
embed.js
malwarebytesunpacked.disqus.com/
72 KB
24 KB
Script
General
Full URL
https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215951
Requested by
Host: www.malwarebytes.com
URL: https://www.malwarebytes.com/js/jquery-1.11.3.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
35c9eac87d8eb24e798c1cb3f0d81a1b7aaf76c16ade420eae02bfcf2177b692
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
23914
adsct
analytics.twitter.com/i/
31 B
653 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?type=javascript&version=1.1.1&p_id=Twitter&p_user_id=0&txn_id=o1m5j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/uwt.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.3 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_f /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
57
x-xss-protection
0
x-response-time
108
pragma
no-cache
last-modified
Fri, 08 Jan 2021 18:40:17 GMT
server
tsa_f
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
4e6832bfa8554f629861b707e8c18293
x-transaction
0073dcfb003480de
expires
Tue, 31 Mar 1981 05:00:00 GMT
up
insight.adsrvr.org/track/ Frame AE19
0
0
Document
General
Full URL
https://insight.adsrvr.org/track/up?adv=8mirph5&ref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&upid=r8yigtp&upv=1.1.0
Requested by
Host: js.adsrvr.org
URL: https://js.adsrvr.org/up_loader.1.1.0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.251.161.187 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-251-161-187.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

:method
GET
:authority
insight.adsrvr.org
:scheme
https
:path
/track/up?adv=8mirph5&ref=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&upid=r8yigtp&upv=1.1.0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
content-type
text/html
cache-control
private,no-cache, must-revalidate
pragma
no-cache
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
1480959392203028
connect.facebook.net/signals/config/
241 KB
69 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1480959392203028?v=2.9.32&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
4b919a08f254f530ba178f849a08cc571a17b94b90f4b77a87baad357843431d
Security Headers
Name Value
Content-Security-Policy default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com data: blob: 'self';script-src *.fbcdn.net *.facebook.net 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' facebook.net *.facebook.net fbcdn.net *.fbcdn.net fbsbx.com *.fbsbx.com;connect-src *.fbcdn.net *.facebook.net attachment.fbsbx.com blob: 'self';block-all-mixed-content;upgrade-insecure-requests;report-uri https://www.facebook.com/csp/reporting/?m=c;
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
0
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
70534
x-fb-rlafr
0
pragma
public
x-fb-debug
S4MroTFLkg48lhA5r4jgMKRIewdDqPI+VNPFpw62vXcpiBln/KIj1vqSd/hRWQ1CtS+DbwcreycbWGVQwghfnQ==
x-fb-trip-id
1814657579
x-frame-options
DENY
date
Fri, 08 Jan 2021 18:40:17 GMT
strict-transport-security
max-age=31536000; preload; includeSubDomains
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
x-content-id
1550725104
expires
Sat, 01 Jan 2000 00:00:00 GMT
error
connect.facebook.net//log/
0
0
Image
General
Full URL
https://connect.facebook.net//log/error?p=pixel&v=2.9.32&e=Error%3A%20cookie%20not%20stored%20properly&s=Error%3A%20cookie%20not%20stored%20properly%0A%20%20%20%20at%20C%20(https%3A%2F%2Fconnect.facebook.net%2Fsignals%2Fconfig%2F1480959392203028%3Fv%3D2.9.32%26r%3Dstable%3A25%3A5431)%0A%20%20%20%20at%20E%20(https%3A%2F%2Fconnect.facebook.net%2Fsignals%2Fconfig%2F1480959392203028%3Fv%3D2.9.32%26r%3Dstable%3A25%3A5786)%0A%20%20%20%20at%20H%20(https%3A%2F%2Fconnect.facebook.net%2Fsignals%2Fconfig%2F1480959392203028%3Fv%3D2.9.32%26r%3Dstable%3A25%3A6228)%0A%20%20%20%20at%20Object.%3Canonymous%3E%20(https%3A%2F%2Fconnect.facebook.net%2Fsignals%2Fconfig%2F1480959392203028%3Fv%3D2.9.32%26r%3Dstable%3A25%3A6905)%0A%20%20%20%20at%20https%3A%2F%2Fconnect.facebook.net%2Fen_US%2Ffbevents.js%3A23%3A6282%0A%20%20%20%20at%20v%20(https%3A%2F%2Fconnect.facebook.net%2Fen_US%2Ffbevents.js%3A23%3A63416)%0A%20%20%20%20at%20a.value%20(https%3A%2F%2Fconnect.facebook.net%2Fen_US%2Ffbevents.js%3A23%3A6209)%0A%20%20%20%20at%20pa%20(https%3A%2F%2Fconnect.facebook.net%2Fen_US%2Ffbevents.js%3A26%3A9347)%0A%20%20%20%20at%20%24%20(https%3A%2F%2Fconnect.facebook.net%2Fen_US%2Ffbevents.js%3A26%3A9985)%0A%20%20%20%20at%20Function.Z%20(https%3A%2F%2Fconnect.facebook.net%2Fen_US%2Ffbevents.js%3A26%3A8768)&ue=0&rs=stable&rqm=FGET
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

/
www.facebook.com/tr/
44 B
258 B
Image
General
Full URL
https://www.facebook.com/tr/?id=1480959392203028&ev=ViewContent&dl=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&rl=&if=false&ts=1610131217622&sw=1600&sh=1200&v=2.9.32&r=stable&ec=0&o=30&fbp=fb.1.1610131217620.1921529853&it=1610131217580&coo=false&rqm=GET
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
44
expires
Fri, 08 Jan 2021 18:40:17 GMT
10110317.json
s.yimg.com/wi/config/
46 B
713 B
XHR
General
Full URL
https://s.yimg.com/wi/config/10110317.json
Requested by
Host: s.yimg.com
URL: https://s.yimg.com/wi/ytc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1288:f03d:1fa::4000 , United Kingdom, ASN10310 (YAHOO-1, US),
Reverse DNS
Software
ATS /
Resource Hash
51f4cf88527819ae3950b1820aa534ebf6c2fcbc0894db427ba5ab59d9efd659
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:39:51 GMT
x-content-type-options
nosniff
age
27
x-amz-server-side-encryption
AES256
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
x-amz-request-id
EB24ED641835CF31
x-amz-id-2
rSmfE/qW/bjHYcrBiSRxiIUxqD5PIIFeQe0mYeeV2PZkYu/0zfyYHB3u5KqWqbjQ/rP4p1/mRPs=
accept-ranges
bytes
referrer-policy
no-referrer-when-downgrade
x-amz-expiration
expiry-date="Thu, 29 Jul 2021 00:00:00 GMT", rule-id="oath-standard-lifecycle"
last-modified
Tue, 23 Jun 2020 16:15:29 GMT
server
ATS
etag
"cc3d0e0815ad7ef45a521c2a63b65393"
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=15552000
access-control-allow-methods
GET
x-amz-version-id
wXZ_nu_nu9aA6v9PTivxO9CdOpSassoA
access-control-allow-origin
*
x-xss-protection
1; mode=block
content-length
46
content-type
application/octet-stream
expires
Fri, 08 Jan 2021 18:44:50 GMT
/
disqus.com/embed/comments/ Frame 4722
0
0

munchkin.js
munchkin.marketo.net/159/
11 KB
6 KB
Script
General
Full URL
https://munchkin.marketo.net/159/munchkin.js
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.236.192 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-236-192.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
459e23d23ffe65a86f3a1f67c07edc92e0c69461ff83fbd63764d7b36cac92fc

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 May 2020 02:24:14 GMT
Server
AkamaiNetStorage
ETag
"79274ffc293e4f76fc372b953f780d16:1588904654.430334"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Cache-Control
max-age=8640000
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
4810
Expires
Sun, 18 Apr 2021 18:40:17 GMT
pixel
q.quora.com/_/ad/64fab857ca52427587d3bd14a8d437b7/
43 B
419 B
Image
General
Full URL
https://q.quora.com/_/ad/64fab857ca52427587d3bd14a8d437b7/pixel?j=1&u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&tag=ViewContent&ts=1610131217665
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.225.115.141 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:18 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Strict-Transport-Security
max-age=63072000; includeSubDomains; preload
X-Q-Stat
,bfa5fb477b65011a6912d3f376239cd3,10.0.0.96,24148,82.102.20.211,,58234860974,1,1610131218.036,0.002,,.,0,0,0.004,0.004,-,0,0,197,98,49,10,26847,,,,,,-,
Content-Type
image/gif
sp.pl
sp.analytics.yahoo.com/
0
933 B
Script
General
Full URL
https://sp.analytics.yahoo.com/sp.pl?a=10000&d=Fri%2C%2008%20Jan%202021%2018%3A40%3A17%20GMT&n=-1&b=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%20-%20Malwarebytes%20Labs%20%7C%20Malwarebytes%20Labs&.yp=10110317&f=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&enc=UTF-8&tagmgr=gtm
Requested by
Host: s.yimg.com
URL: https://s.yimg.com/wi/ytc.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
212.82.100.181 , Switzerland, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
spdc.pbp.vip.ir2.yahoo.com
Software
ATS /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
X-Content-Type-Options
nosniff
Age
0
Connection
keep-alive
Content-Length
0
X-XSS-Protection
1; mode=block
Pragma
no-cache
Referrer-Policy
strict-origin-when-cross-origin
Server
ATS
X-Frame-Options
DENY
Expect-CT
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Strict-Transport-Security
max-age=31536000
Content-Type
application/x-javascript
Cache-Control
no-cache, private, must-revalidate
Accept-Ranges
bytes
Expires
Fri, 08 Jan 2021 18:40:17 GMT
visitWebPage
805-usg-300.mktoresp.com/webevents/
2 B
311 B
XHR
General
Full URL
https://805-usg-300.mktoresp.com/webevents/visitWebPage?_mchNc=1610131217703&_mchCn=&_mchId=805-USG-300&_mchTk=_mch-malwarebytes.com-1610131217702-62500&_mchHo=blog.malwarebytes.com&_mchPo=&_mchRu=%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&_mchPc=https%3A&_mchVr=159&_mchEcid=&_mchHa=&_mchRe=&_mchQp=
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/159/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.144.124 , United States, ASN15224 (OMNITURE, US),
Reverse DNS
Software
nginx /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:18 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
Content-Type
text/plain; charset=UTF-8
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Request-Id
e82328bc-ede3-4ef5-ba05-1ea227f021df
lounge.93b42de3124a0dd0533f88d602ff11e8.css
c.disquscdn.com/next/embed/styles/
0
22 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.93b42de3124a0dd0533f88d602ff11e8.css
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215951
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168715
strict-transport-security
max-age=300; includeSubdomains
content-length
22661
cf-request-id
0784e5b5630000177a1686c000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-5885"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bcf0b4c177a-FRA
x-amz-cf-id
FoLAKKYeyCVOQCHjxkf648euNl2eE6RaXpXOfpVsO0oF_J48wSAC-w==
expires
Thu, 06 Jan 2022 19:48:21 GMT
common.bundle.de93b98d666f8e6c7505f802a907a867.js
c.disquscdn.com/next/embed/
0
93 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.de93b98d666f8e6c7505f802a907a867.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215951
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168716
strict-transport-security
max-age=300; includeSubdomains
content-length
94780
cf-request-id
0784e5b5650000177a22a19000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-1723c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bcf0b4f177a-FRA
x-amz-cf-id
Qu4oNWqpLJ8y9PXfL-VGAE9V9ADfjzDcz1G_P1sBId44bHg1MBhBvA==
expires
Thu, 06 Jan 2022 19:48:21 GMT
lounge.bundle.b00141b8e7a9878087e2d84485476038.js
c.disquscdn.com/next/embed/
0
114 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.b00141b8e7a9878087e2d84485476038.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215951
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168715
strict-transport-security
max-age=300; includeSubdomains
content-length
116447
cf-request-id
0784e5b5630000177a3e915000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-1c6df"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bcf0b50177a-FRA
x-amz-cf-id
Yc_MGoCjsBblRoSjmjt3J9uZx4r3PRNlMryaeVdCaHO4-zgHDDy4oQ==
expires
Thu, 06 Jan 2022 19:48:21 GMT
config.js
disqus.com/next/
0
10 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215951
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:17 GMT
X-Content-Type-Options
nosniff
Content-Type
application/javascript; charset=UTF-8
Server
nginx
Age
32
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
9280
X-XSS-Protection
1; mode=block
/
disqus.com/embed/comments/ Frame 79E4
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=46011%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D46011&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&t_e=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&t_d=%0A%09%09%09%09%09Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%09%09%09%09&t_t=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&s_o=default
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/

Response headers

Connection
keep-alive
Content-Length
2954
Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Wed, 06 Jan 2021 15:14:54 GMT
ETag
W/"lounge:view:8344671870.550cec0b78ffecd7552f2100e01d20d5.2"
Content-Encoding
gzip
Date
Fri, 08 Jan 2021 18:40:17 GMT
Age
0
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
/
www.facebook.com/tr/
0
75 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundary00MWMkrV7oqzQOgf

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
date
Fri, 08 Jan 2021 18:40:18 GMT
content-type
text/plain
access-control-allow-origin
https://blog.malwarebytes.com
access-control-allow-credentials
true
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
lounge.93b42de3124a0dd0533f88d602ff11e8.css
c.disquscdn.com/next/embed/styles/
0
22 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.93b42de3124a0dd0533f88d602ff11e8.css
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215949
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168716
strict-transport-security
max-age=300; includeSubdomains
content-length
22661
cf-request-id
0784e5ba110000177a2f9cf000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-5885"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bd68c06177a-FRA
x-amz-cf-id
FoLAKKYeyCVOQCHjxkf648euNl2eE6RaXpXOfpVsO0oF_J48wSAC-w==
expires
Thu, 06 Jan 2022 19:48:21 GMT
common.bundle.de93b98d666f8e6c7505f802a907a867.js
c.disquscdn.com/next/embed/
0
93 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.de93b98d666f8e6c7505f802a907a867.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215949
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168717
strict-transport-security
max-age=300; includeSubdomains
content-length
94780
cf-request-id
0784e5ba110000177a2aad9000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-1723c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bd68c0b177a-FRA
x-amz-cf-id
Qu4oNWqpLJ8y9PXfL-VGAE9V9ADfjzDcz1G_P1sBId44bHg1MBhBvA==
expires
Thu, 06 Jan 2022 19:48:21 GMT
lounge.bundle.b00141b8e7a9878087e2d84485476038.js
c.disquscdn.com/next/embed/
0
114 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.b00141b8e7a9878087e2d84485476038.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215949
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a913 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 08 Jan 2021 18:40:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
168716
strict-transport-security
max-age=300; includeSubdomains
content-length
116447
cf-request-id
0784e5ba110000177a4d90a000000001
timing-allow-origin
*
last-modified
Thu, 17 Dec 2020 22:41:59 GMT
server
cloudflare
etag
"5fdbdeb7-1c6df"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
DFW55-C3
accept-ranges
bytes
cf-ray
60e80bd68c0c177a-FRA
x-amz-cf-id
Yc_MGoCjsBblRoSjmjt3J9uZx4r3PRNlMryaeVdCaHO4-zgHDDy4oQ==
expires
Thu, 06 Jan 2022 19:48:21 GMT
config.js
disqus.com/next/
0
10 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js?_=1610131215949
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 08 Jan 2021 18:40:18 GMT
X-Content-Type-Options
nosniff
Content-Type
application/javascript; charset=UTF-8
Server
nginx
Age
33
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
9280
X-XSS-Protection
1; mode=block
/
disqus.com/embed/comments/ Frame A24B
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=46011%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D46011&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&t_e=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&t_d=%0A%09%09%09%09%09Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%09%09%09%09&t_t=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&s_o=default
Requested by
Host: malwarebytesunpacked.disqus.com
URL: https://malwarebytesunpacked.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/

Response headers

Connection
keep-alive
Content-Length
2954
Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Wed, 06 Jan 2021 15:14:54 GMT
ETag
W/"lounge:view:8344671870.550cec0b78ffecd7552f2100e01d20d5.2"
Content-Encoding
gzip
Date
Fri, 08 Jan 2021 18:40:19 GMT
Age
1
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
disqus.com
URL
https://disqus.com/embed/comments/?base=default&f=malwarebytesunpacked&t_i=46011%20https%3A%2F%2Fblog.malwarebytes.com%2F%3Fp%3D46011&t_u=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&t_e=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&t_d=%0A%09%09%09%09%09Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat%09%09%09%09&t_t=Retrohunting%20APT37%3A%20North%20Korean%20APT%20used%20VBA%20self%20decode%20technique%20to%20inject%20RokRat&s_o=default

Verdicts & Comments Add Verdict or Comment

162 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| _wpemojiSettings function| $ function| jQuery boolean| pp_alreadyInitialized object| rlArgs number| a undefined| c function| jsonFeed object| OneTrust object| Optanon string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer object| jQuery11130758449319588643 undefined| jQuery11130758449319588643_1610131215947 function| OptanonWrapper boolean| alertFallback object| respond object| Modernizr object| html5 function| yepnope object| BackgroundCheck object| flexibility function| readCookie object| acceptCookies undefined| setCookie function| overlay function| getVariable boolean| isAdw boolean| uuid boolean| uuidParam object| uuidCookie object| cookieSettings function| EventEmitter object| eventie function| imagesLoaded object| mbamFreeValues object| mbamPremiumValues object| webpageValues undefined| midCookie object| playfairLsd boolean| midValue boolean| xsourceValue boolean| playfairValue boolean| refpage boolean| mktoLs undefined| lsCookie undefined| xsourceCookie undefined| playfairCookie function| applyXSource function| modURLParam string| urlID object| google_tag_manager function| postscribe number| hshInterval string| GoogleAnalyticsObject function| ga string| _linkedin_data_partner_id function| twq object| countVars string| disqus_shortname object| embedVars string| disqus_url string| disqus_identifier string| disqus_container_id string| disqus_title undefined| disqus_config_custom function| disqus_config object| wpcom_img_zoomer object| detectZoom string| homeLink object| wp function| Spinner object| jetpackCarouselStrings function| submitSearchFooter function| submitSearchNav function| submitSearchrightrail undefined| countryError string| country undefined| xdr function| rl_view_image function| rl_hide_image boolean| doresize object| scroll_pos object| jQuery112406902492938656104 boolean| hashtag function| closeSearchBar string| amphtml number| deviceWidth boolean| isMacLike object| preferredLanguage boolean| isMac boolean| isWindows boolean| isAndroid boolean| isiPhone boolean| isiPad boolean| isChromeOS function| showCurrentTab function| moveLabsNav object| uetq object| google_tag_data object| gaplugins object| gaGlobal object| gaData function| lintrk boolean| _already_called_lintrk object| twemoji object| twttr object| DISQUSWIDGETS undefined| disqus_domain object| CE2 string| CE_USER_DATA_URL string| CE_USER_COMMON_SCRIPT_URL string| fieldIds object| fields function| expandFormFields function| showAllFields function| hideFormFields function| demandbaseLoaded string| _linkedin_partner_id object| _linkedin_data_partner_ids function| UET function| gtag number| number_of_pillar_pages_to_show object| CE2BH function| ttd_dom_ready function| TTDUniversalPixelApi function| __extends object| Demandbase object| __db function| DBSegment undefined| demandbaseMarketoFormId function| GooglemKTybQhCsO function| google_trackConversion object| GooglebQhCsO object| DISQUS string| axel boolean| cp function| fbq function| _fbq function| qp object| dotq object| YAHOO function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin object| qevents object| MunchkinTracker

8 Cookies

Domain/Path Name / Value
.malwarebytes.com/ Name: _uetvid
Value: f391fe7051e011eba2010b9c01ced5ed
.malwarebytes.com/ Name: _gid
Value: GA1.2.326590158.1610131217
.malwarebytes.com/ Name: OptanonConsent
Value: isIABGlobal=false&datestamp=Fri+Jan+08+2021+19%3A40%3A17+GMT%2B0100+(Central+European+Standard+Time)&version=6.4.0&landingPath=https%3A%2F%2Fblog.malwarebytes.com%2Fthreat-analysis%2F2021%2F01%2Fretrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat%2F&groups=1%3A1%2C0_165071%3A1%2C101%3A1%2C2%3A1%2C3%3A1%2C102%3A1%2C103%3A1%2C4%3A1%2C104%3A1%2C105%3A1%2C106%3A1%2C107%3A1%2C109%3A1%2C110%3A1%2C112%3A1%2C113%3A1%2C114%3A1%2C115%3A1%2C116%3A1%2C117%3A1%2C118%3A1%2C0_165051%3A1%2C0_165052%3A1%2C0_165053%3A1%2C0_165054%3A1%2C0_165055%3A1%2C0_165056%3A1%2C0_165057%3A1%2C0_165058%3A1%2C0_165059%3A1%2C0_165060%3A1%2C0_165061%3A1%2C0_165062%3A1%2C0_165063%3A1%2C0_165064%3A1%2C0_165065%3A1%2C0_165066%3A1%2C0_165067%3A1%2C0_165068%3A1%2C0_165069%3A1%2C0_165070%3A1%2C0_165072%3A1%2C0_165073%3A1%2C0_165074%3A1%2C0_168809%3A1%2C0_168810%3A1%2C0_171059%3A1%2C0_171060%3A1%2C0_171061%3A1%2C0_171062%3A1%2C0_171063%3A1%2C0_171064%3A1%2C0_172264%3A1%2C0_172327%3A1%2C0_179764%3A1%2C0_172332%3A1%2C0_172328%3A1%2C0_172329%3A1%2C108%3A1%2C111%3A1
.malwarebytes.com/ Name: _uetsid
Value: f391c27051e011ebb846eb0f19aeb828
.doubleclick.net/ Name: test_cookie
Value: CheckForPermission
.malwarebytes.com/ Name: _ga
Value: GA1.2.1039056146.1610131217
.malwarebytes.com/ Name: _gat
Value: 1
.malwarebytes.com/ Name: _gcl_au
Value: 1.1.476608955.1610131217

5 Console Messages

Source Level URL
Text
console-api log URL: https://www.malwarebytes.com/js/nav-resize.js(Line 268)
Message:
There is no hero section
console-api log URL: https://malwarebytesunpacked.disqus.com/embed.js(Line 44)
Message:
Use DISQUS.reset instead of reloading embed.js please.
console-api log URL: https://malwarebytesunpacked.disqus.com/embed.js(Line 44)
Message:
See https://help.disqus.com/customer/portal/articles/472107-using-disqus-on-ajax-sites
console-api log URL: https://malwarebytesunpacked.disqus.com/embed.js(Line 44)
Message:
Use DISQUS.reset instead of reloading embed.js please.
console-api log URL: https://malwarebytesunpacked.disqus.com/embed.js(Line 44)
Message:
See https://help.disqus.com/customer/portal/articles/472107-using-disqus-on-ajax-sites

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

5118230.fls.doubleclick.net
805-usg-300.mktoresp.com
9812475.fls.doubleclick.net
a.quora.com
ads.avct.cloud
ads.avocet.io
analytics.twitter.com
api.company-target.com
bat.bing.com
blog.malwarebytes.com
c.disquscdn.com
connect.facebook.net
disqus.com
fonts.googleapis.com
genesis.malwarebytes.com
geolocation.onetrust.com
googleads.g.doubleclick.net
id.rlcdn.com
insight.adsrvr.org
js.adsrvr.org
malwarebytesunpacked.disqus.com
match.prod.bidr.io
munchkin.marketo.net
optanon.blob.core.windows.net
px.ads.linkedin.com
q.quora.com
s.yimg.com
s0.wp.com
script.crazyegg.com
scripts.demandbase.com
secure.gravatar.com
segments.company-target.com
snap.licdn.com
sp.analytics.yahoo.com
static.ads-twitter.com
stats.g.doubleclick.net
t.co
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagmanager.com
www.linkedin.com
www.malwarebytes.com
disqus.com
104.111.236.192
104.244.42.133
104.244.42.3
13.224.100.124
13.224.94.61
13.224.94.99
130.211.198.3
151.101.112.134
151.101.13.2
151.101.192.134
172.217.18.166
172.217.22.66
192.0.77.32
192.28.144.124
199.232.136.157
212.82.100.181
216.58.205.230
2600:1f18:21ae:6700:958f:43e8:31e6:f032
2600:9000:2190:b400:8:d3fb:39c0:93a1
2606:4700:10::6814:b844
2606:4700::6812:a913
2606:4700::6813:9408
2620:1ec:21::14
2620:1ec:c11::200
2a00:1288:f03d:1fa::4000
2a00:1450:4001:801::2002
2a00:1450:4001:801::200e
2a00:1450:4001:803::2003
2a00:1450:4001:803::2004
2a00:1450:4001:808::200a
2a00:1450:4001:809::2003
2a00:1450:4001:80b::2004
2a00:1450:4001:825::2008
2a00:1450:400c:c00::9a
2a02:26f0:6c00:296::25ea
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
2a04:fa87:fffe::c000:4902
2a05:f500:10:101::b93f:9105
3.225.115.141
34.120.207.148
34.251.161.187
52.214.70.9
52.239.137.4
52.85.115.13
54.194.211.3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