SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 11cd138f46db0091c0b85b16b2d0e88af44328ad.
Database Entry
| SHA1 Fingerprint: | 11cd138f46db0091c0b85b16b2d0e88af44328ad | 
|---|---|
| Certificate Common Name (CN): | Covid Server CA | 
| Issuer Distinguished Name (DN): | Covid Server CA | 
| TLS Version: | TLS 1.2 | 
| First seen: | 2021-07-31 18:55:53 UTC | 
| Last seen: | 2021-08-10 02:26:06 UTC | 
| Status: | Blacklisted | 
| Listing reason: | Malware C&C | 
| Listing date: | 2021-08-01 06:45:59 | 
| Malware samples: | 2 | 
| Botnet C&Cs: | 2 | 
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) | 
|---|---|---|---|---|
| 2021-08-10 02:26:06 | 8b8ce7bbc20e4d2dfb111a6a870d97c0 |  33 / 70 (47.14%) | QuasarRAT | 185.19.85.177:1981 | 
| 2021-08-10 02:26:06 | 8b8ce7bbc20e4d2dfb111a6a870d97c0 |  33 / 70 (47.14%) | QuasarRAT | 185.19.85.177:1981 | 
| 2021-07-31 18:55:53 | 33b8384412619f044e88ce017230827b |  24 / 70 (34.29%) | 194.5.97.223:1981 | |
| 2021-07-31 18:55:53 | 33b8384412619f044e88ce017230827b |  24 / 70 (34.29%) | 194.5.97.223:1981 | 
# of entries: 4 (max: 100)