SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 045608f3966c502feeee8931db169e084d2b475c.

Database Entry


SHA1 Fingerprint:045608f3966c502feeee8931db169e084d2b475c
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1
First seen:2022-03-08 06:50:24 UTC
Last seen:2022-03-08 11:22:23 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2022-03-08 11:06:21
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2022-03-08 11:22:238d515ce46e43cfd8efd1782ecebea585Virustotal results 11 / 55 (20.00%) AsyncRAT208.51.61.44:128
2022-03-08 06:50:2495db775b2006533ec4a464e90c615c80Virustotal results 14 / 56 (25.00%) AsyncRAT208.51.61.44:128

# of entries: 2 (max: 100)