MalwareBazaar Database

This page shows some basic information the YARA rule APT_NK_Methodology_Artificial_UserAgent_IE_Win7 including corresponding malware samples.

Database Entry


YARA Rule:APT_NK_Methodology_Artificial_UserAgent_IE_Win7
Author:Steve Miller aka @stvemillertime
Description:Detects hard-coded User-Agent string that has been present in several APT37 malware families.
Firstseen:2020-03-18 22:38:25 UTC
Lastseen:2025-12-03 14:14:02 UTC
Sightings:7

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter