URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Submission: On February 20 via manual from US

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 34 HTTP transactions. The main IP is 61.164.47.201, located in Hangzhou, China and belongs to CHINANET-BACKBONE No.31,Jin-rong Street, CN. The main domain is ti.dbappsecurity.com.cn.
TLS certificate: Issued by GlobalSign RSA OV SSL CA 2018 on February 24th 2020. Valid for: 2 years.
This is the only time ti.dbappsecurity.com.cn was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
31 61.164.47.201 4134 (CHINANET-...)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
34 4
Domain Requested by
31 ti.dbappsecurity.com.cn ti.dbappsecurity.com.cn
2 fonts.gstatic.com fonts.googleapis.com
1 fonts.googleapis.com ti.dbappsecurity.com.cn
34 3

This site contains links to these domains. Also see Links.

Domain
dbappsecurity.com
Subject Issuer Validity Valid
*.dbappsecurity.com.cn
GlobalSign RSA OV SSL CA 2018
2020-02-24 -
2022-04-18
2 years crt.sh
upload.video.google.com
GTS CA 1O1
2021-01-26 -
2021-04-20
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2021-01-26 -
2021-04-20
3 months crt.sh

This page contains 1 frames:

Primary Page: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Frame ID: 392B65419EC7E8997981BBE94CFCAC38
Requests: 35 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

34
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

2121 kB
Transfer

2498 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

34 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
393 KB
256 KB
Document
General
Full URL
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx / PHP/7.2.27
Resource Hash
5fba4c3717edd08a68f6fc1dc8dcaf5a2ed24228a8343a0c27a457e4441195be

Request headers

Host
ti.dbappsecurity.com.cn
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
nginx
Date
Sat, 20 Feb 2021 14:05:31 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
X-Powered-By
PHP/7.2.27
X-Pingback
https://ti.dbappsecurity.com.cn/blog/xmlrpc.php
Link
<https://ti.dbappsecurity.com.cn/blog/index.php/wp-json/>; rel="https://api.w.org/" <https://ti.dbappsecurity.com.cn/blog/index.php/wp-json/wp/v2/posts/1519>; rel="alternate"; type="application/json" <https://ti.dbappsecurity.com.cn/blog/?p=1519>; rel=shortlink
Content-Encoding
gzip
style.min.css
ti.dbappsecurity.com.cn/blog/wp-includes/css/dist/block-library/
50 KB
50 KB
Stylesheet
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-includes/css/dist/block-library/style.min.css?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
5c2288ca7b324881faae5e368eb4d69457e2784e042e868de335d3827bb90981

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:32 GMT
Last-Modified
Fri, 29 Jan 2021 09:55:15 GMT
Server
nginx
ETag
"c8e9-5ba070042f6b5"
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
51433
bootstrap.css
ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/css/
144 KB
144 KB
Stylesheet
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/css/bootstrap.css?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
ef9c554bca3ce5b9f978b626ff8c3a441c0468af2599bdb4e9b6b32f6743f058

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:33 GMT
Last-Modified
Wed, 23 Sep 2020 07:15:06 GMT
Server
nginx
ETag
"23fe6-5aff5d7d84607"
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
147430
font-awesome.min.css
ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/font-awesome/css/
23 KB
23 KB
Stylesheet
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/font-awesome/css/font-awesome.min.css?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
541ac58217a8ade1a5e292a65a0661dc9db7a49ae13654943817a4fbc6761afd

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:32 GMT
Last-Modified
Wed, 23 Sep 2020 07:15:06 GMT
Server
nginx
ETag
"5cbb-5aff5d7d849ef"
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
23739
style.css
ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/
34 KB
34 KB
Stylesheet
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/style.css?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
f3aa1e85d3226abb38f698ad6c5d7a64c52dacdb4bbd14191c079b63d960780b

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:32 GMT
Last-Modified
Wed, 23 Sep 2020 07:15:06 GMT
Server
nginx
ETag
"8819-5aff5d7d878cf"
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
34841
css
fonts.googleapis.com/
6 KB
886 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:400,300italic,700|Source+Sans+Pro:400,400italic
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
c718d5e963dd1b3223577de32ba9ce1fecbf842cf2310d182963f9ae200ffac7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 20 Feb 2021 14:05:31 GMT
server
ESF
date
Sat, 20 Feb 2021 14:05:31 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 20 Feb 2021 14:05:31 GMT
jquery.min.js
ti.dbappsecurity.com.cn/blog/wp-includes/js/jquery/
87 KB
88 KB
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-includes/js/jquery/jquery.min.js?ver=3.5.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
60240d5a27ede94fd35fea44bd110b88c7d8cfc08127f032d13b0c622b8be827

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:32 GMT
Last-Modified
Fri, 29 Jan 2021 09:55:15 GMT
Server
nginx
ETag
"15d98-5ba070043e115"
Content-Type
text/plain; charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
89496
jquery-migrate.min.js
ti.dbappsecurity.com.cn/blog/wp-includes/js/jquery/
11 KB
11 KB
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
029e0a2e809fd6b5dbe76abe8b7a74936be306c9a8c27c814c4d44aa54623300

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:32 GMT
Last-Modified
Fri, 29 Jan 2021 09:55:15 GMT
Server
nginx
ETag
"2bd8-5ba070043dd2d"
Content-Type
text/plain; charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
11224
wp-emoji-release.min.js
ti.dbappsecurity.com.cn/blog/wp-includes/js/
14 KB
14 KB
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-includes/js/wp-emoji-release.min.js?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
0c5f584d1ea2c3313dc8c55824c2a572d3cf2eae87c5ca62a58e598aec9ddb5c

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:33 GMT
Last-Modified
Mon, 08 Feb 2021 02:27:19 GMT
Server
nginx
ETag
"3795-5bac9e8ba4fdd"
Content-Type
text/plain; charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
14229
bootstrap.js
ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/js/
67 KB
68 KB
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/js/bootstrap.js?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
ef43a4d502ffb688656851d788c42869d47e8840d007b4f4b66f62530171acd4

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:33 GMT
Last-Modified
Wed, 23 Sep 2020 07:15:06 GMT
Server
nginx
ETag
"10d1a-5aff5d7d86547"
Content-Type
text/plain; charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
68890
navigation.js
ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/js/
3 KB
3 KB
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/js/navigation.js?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
a6e9a4d24ddc59d459a87d112a1b4aeb825a43beb56041b40a1efe09b5a491ba

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:32 GMT
Last-Modified
Wed, 23 Sep 2020 07:15:06 GMT
Server
nginx
ETag
"c86-5aff5d7d8692f"
Content-Type
text/plain; charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3206
skip-link-focus-fix.js
ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/js/
751 B
962 B
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/js/skip-link-focus-fix.js?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
5a1a3a3f0ef52a304cde50940ee607a2ebb008b76fa4cf49721b6e5cc07c350a

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:32 GMT
Last-Modified
Wed, 23 Sep 2020 07:15:06 GMT
Server
nginx
Connection
keep-alive
Accept-Ranges
bytes
ETag
"2ef-5aff5d7d8692f"
Content-Length
751
nisarg.js
ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/js/
2 KB
2 KB
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/js/nisarg.js?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
b73ec855361ff486832406e9f53820cf95319765a68d0e2d94eeb528125939b8

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:33 GMT
Last-Modified
Wed, 23 Sep 2020 07:15:06 GMT
Server
nginx
ETag
"8db-5aff5d7d8692f"
Content-Type
text/plain; charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2267
comment-reply.min.js
ti.dbappsecurity.com.cn/blog/wp-includes/js/
3 KB
3 KB
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-includes/js/comment-reply.min.js?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
ab21fef3ac4ee12ebb305942f85de99b290b8a24654c69060e54673d5f3a11f2

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:33 GMT
Last-Modified
Mon, 08 Feb 2021 02:27:19 GMT
Server
nginx
ETag
"ba6-5bac9e8ba53c5"
Content-Type
text/plain; charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2982
wp-embed.min.js
ti.dbappsecurity.com.cn/blog/wp-includes/js/
1 KB
2 KB
Script
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-includes/js/wp-embed.min.js?ver=5.6.1
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
5be614bce53f767993a5f5f14a6badd6aae6bf3af7cbdbf4d31520de49e27991

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:33 GMT
Last-Modified
Mon, 08 Feb 2021 02:27:19 GMT
Server
nginx
ETag
"592-5bac9e8ba4fdd"
Content-Type
text/plain; charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1426
truncated
/
241 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e8075662da954759f23d9fc9dc887cf6ad1b403c9ab34dbc0fa1a9e75450830e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7lujVj9w.woff2
fonts.gstatic.com/s/sourcesanspro/v14/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/sourcesanspro/v14/6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7lujVj9w.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:400,300italic,700|Source+Sans+Pro:400,400italic
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ecf76895be1cf9e8b3edb254030e9c9c1d8f3c2efc1f9dc7e04ceff29eccae9c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://ti.dbappsecurity.com.cn
Referer
https://fonts.googleapis.com/css?family=Lato:400,300italic,700|Source+Sans+Pro:400,400italic
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 18 Feb 2021 19:41:26 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:10:14 GMT
server
sffe
age
152648
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13324
x-xss-protection
0
expires
Fri, 18 Feb 2022 19:41:26 GMT
S6uyw4BMUTPHjx4wXiWtFCc.woff2
fonts.gstatic.com/s/lato/v17/
14 KB
14 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6uyw4BMUTPHjx4wXiWtFCc.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:400,300italic,700|Source+Sans+Pro:400,400italic
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
036d841b132c14046e26d8f2da1bc634c6ad34885ed1295660694a91c98933a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://ti.dbappsecurity.com.cn
Referer
https://fonts.googleapis.com/css?family=Lato:400,300italic,700|Source+Sans+Pro:400,400italic
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 20 Feb 2021 06:30:25 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:12:59 GMT
server
sffe
age
27309
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14044
x-xss-protection
0
expires
Sun, 20 Feb 2022 06:30:25 GMT
fontawesome-webfont.woff2
ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/font-awesome/fonts/
55 KB
56 KB
Font
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/font-awesome/fonts/fontawesome-webfont.woff2?v=4.3.0
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/font-awesome/css/font-awesome.min.css?ver=5.6.1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
aadc3580d2b64ff5a7e6f1425587db4e8b033efcbf8f5c332ca52a5ed580c87c

Request headers

Origin
https://ti.dbappsecurity.com.cn
Referer
https://ti.dbappsecurity.com.cn/blog/wp-content/themes/nisarg/font-awesome/css/font-awesome.min.css?ver=5.6.1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:34 GMT
Last-Modified
Wed, 23 Sep 2020 07:15:06 GMT
Server
nginx
Connection
keep-alive
Accept-Ranges
bytes
ETag
"ddcc-5aff5d7d84dd7"
Content-Length
56780
word-image-44.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
91 KB
91 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-44.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
eaa077d0de7e1801aec448a072de8d9004a9fb8062dcbec2dd55a6b13efa00b0

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:34 GMT
Last-Modified
Sat, 30 Jan 2021 03:03:49 GMT
Server
nginx
ETag
"16b49-5ba155eb5663e"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
93001
word-image-45.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
89 KB
90 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-45.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
294ecd34a515d558980aaafa5e20b1207d8d2f6638e2f0a9528aba6a3492b7d5

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:34 GMT
Last-Modified
Sat, 30 Jan 2021 03:03:51 GMT
Server
nginx
ETag
"165f2-5ba155ecfb4b6"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
91634
word-image-46.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
44 KB
44 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-46.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
a0bc086ecf8ffe8db0933b1b001c9052acec32898eaaa5c9dbf0597cda449c3b

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:34 GMT
Last-Modified
Sat, 30 Jan 2021 03:03:52 GMT
Server
nginx
ETag
"ae62-5ba155ee87c8d"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
44642
word-image-47.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
121 KB
121 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-47.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
6e3009c030345357d9dfe3cc41c53d439770a801c3aa7fce3cdbf4599a932488

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:34 GMT
Last-Modified
Sat, 30 Jan 2021 03:03:54 GMT
Server
nginx
ETag
"1e4c2-5ba155eff2d3a"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
124098
word-image-48.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
35 KB
35 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-48.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
8a5d5dff343e640495ddf2d8dbf58200b06d6ff00dc4150f5480a5944bb8c155

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:34 GMT
Last-Modified
Sat, 30 Jan 2021 03:03:57 GMT
Server
nginx
ETag
"8ccf-5ba155f2f0f36"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
36047
word-image-49.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
94 KB
95 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-49.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
3b5cc3e908c7d9854be1e8882cc40d22e761bffb5a4986cb9611a226a5b482df

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:35 GMT
Last-Modified
Sat, 30 Jan 2021 03:03:58 GMT
Server
nginx
ETag
"179df-5ba155f393cb8"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96735
word-image-50.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
83 KB
84 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-50.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
757eb958359b74dea81384fc45b6ddb8f1e8c6801c00b3f9a4dd84d5677635ee

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:34 GMT
Last-Modified
Sat, 30 Jan 2021 03:03:59 GMT
Server
nginx
ETag
"14d4b-5ba155f4d1ea2"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
85323
word-image-51.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
298 KB
298 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-51.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
7918e514d4dafc07a378c452a2978a286b3e00660e1b5b4d9c655bb23d08642c

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:35 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:00 GMT
Server
nginx
ETag
"4a86c-5ba155f5ca740"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
305260
word-image-52.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
118 KB
119 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-52.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
ba6daea32aa14cb2e9f23c87aaf56b280b0ab1e60c7df1a446084fff641113a6

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:35 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:02 GMT
Server
nginx
ETag
"1d95b-5ba155f811f52"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
121179
word-image-53.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
113 KB
113 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-53.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
c2a8640546a9bca6a8bf89d988cd2af0e54a39abdb577de2b6734473ca46b356

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:35 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:04 GMT
Server
nginx
ETag
"1c2ad-5ba155f9708c6"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
115373
word-image-54.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
76 KB
77 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-54.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
fad042154820a1574b8d414d069e66f8c8555b1f6096a86aa4f0c82054dade70

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:35 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:06 GMT
Server
nginx
ETag
"131b7-5ba155fb67f93"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
78263
word-image-55.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
36 KB
36 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-55.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
89bd4b7f9315ea566f1058938153450b0708a6bc840c430037224ea8140e8cf9

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:35 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:07 GMT
Server
nginx
ETag
"90ad-5ba155fc0439c"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
37037
word-image-56.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
29 KB
29 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-56.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
e6e800bcab3a41b4fb595f59330da1e2adb08f2df97e10615423eb06516f4bd7

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:35 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:08 GMT
Server
nginx
ETag
"740a-5ba155fd0f134"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
29706
word-image-57.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
50 KB
50 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-57.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
224fdf78abfd92f0cda0fd7162f14b48ae1155805b7db231975e9f18ed36d96a

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:37 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:08 GMT
Server
nginx
ETag
"c696-5ba155fdcdc07"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
50838
word-image-58.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
38 KB
38 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-58.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
4e6d42801eb69dce9b71306f428438f1826a7010bc21c9bc7a23f73d553f1a66

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:36 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:09 GMT
Server
nginx
ETag
"96db-5ba155fe851a9"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
38619
word-image-59.png
ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/
18 KB
18 KB
Image
General
Full URL
https://ti.dbappsecurity.com.cn/blog/wp-content/uploads/2021/01/word-image-59.png
Requested by
Host: ti.dbappsecurity.com.cn
URL: https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
61.164.47.201 Hangzhou, China, ASN4134 (CHINANET-BACKBONE No.31,Jin-rong Street, CN),
Reverse DNS
Software
nginx /
Resource Hash
ce1096e0cfc4a7b9d27c37227d97956852f02bde8236d5f2d7393c1688580694

Request headers

Referer
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 20 Feb 2021 14:05:36 GMT
Last-Modified
Sat, 30 Jan 2021 03:04:10 GMT
Server
nginx
ETag
"4710-5ba155ff198b2"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
18192

Verdicts & Comments Add Verdict or Comment

17 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| _wpemojiSettings object| twemoji object| wp undefined| $ function| jQuery object| screenReaderText object| addComment undefined| height

0 Cookies

1 Console Messages

Source Level URL
Text
console-api log URL: https://ti.dbappsecurity.com.cn/blog/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 3.3.2

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

fonts.googleapis.com
fonts.gstatic.com
ti.dbappsecurity.com.cn
2a00:1450:4001:810::2003
2a00:1450:4001:812::200a
61.164.47.201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