SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 3f66241b807bb224a1256b7b00626da6541b6d6f.

Database Entry


SHA1 Fingerprint:3f66241b807bb224a1256b7b00626da6541b6d6f
Certificate Common Name (CN):DcRat
Issuer Distinguished Name (DN):DcRat Server, OU=qwqdanchun, O=DcRat By qwqdanchun, L=SH, C=CN
TLS Version:TLSv1
First seen:2022-10-27 18:36:15 UTC
Last seen:2022-10-27 18:39:54 UTC
Status:Blacklisted
Listing reason:DCRat C&C
Listing date:2022-10-28 06:11:58
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2022-10-27 18:39:54ce58fd93ed03f528a635171addb8a20bVirustotal results 60 / 72 (83.33%) AsyncRAT20.127.173.166:8973
2022-10-27 18:36:4965da17fe3fa096bfcbea9e6c4ac31ff0Virustotal results 58 / 72 (80.56%) AsyncRAT20.127.173.166:8973
2022-10-27 18:36:159245ef457eba28730988c852b293d2deVirustotal results 53 / 71 (74.65%) DCRat20.127.173.166:8973

# of entries: 3 (max: 100)