Hunting Malicious Infrastructure using JARM and HTTP Response