SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 212e665ea0decef61aa4dedd4d945ff0c4953a91.

Database Entry


SHA1 Fingerprint:212e665ea0decef61aa4dedd4d945ff0c4953a91
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1' NOTBEFOR
First seen:2020-07-07 08:25:50 UTC
Last seen:2020-08-04 06:36:36 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2020-07-07 09:15:41
Malware samples:7
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-08-04 06:36:36519841636c066a34094691787e5d6a1dn/aAgentTesla194.5.97.11:27031
2020-08-03 07:07:080c56ad6e4196af5c7a343c3e29addaben/aAsyncRAT194.5.97.11:27031
2020-07-29 04:42:0484d550bc3adcb845f8ff3077f54b0b7bn/aAsyncRAT185.140.53.11:9845
2020-07-28 06:15:00f294ea589e81c04dbf23e94c9569d476n/aAsyncRAT185.140.53.11:9845
2020-07-16 06:37:088dc8dd6ff7a50bf1bdcdaeea069a4ae6n/aAgentTesla185.140.53.11:9845
2020-07-15 10:08:3711c310b32f703fce79ce0f8c81710461n/a185.140.53.11:9845
2020-07-07 08:25:502698aef990026c034352cc9e5b6fb4f8n/aAsyncRAT185.140.53.11:9845

# of entries: 7 (max: 100)