SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 4a90b8956d73dc5d1a2fc8633f6bb48ce9239068.

Database Entry


SHA1 Fingerprint:4a90b8956d73dc5d1a2fc8633f6bb48ce9239068
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1' NOTBEFOR
First seen:2020-03-05 21:16:04 UTC
Last seen:2020-04-29 08:01:42 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2020-04-22 07:26:43
Malware samples:3
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-04-29 08:01:42027261d0da0a337c1caf3fe35bf98ea5n/aAsyncRAT185.244.29.175:7071
2020-04-22 01:26:4123fb12e2cb336c690c425f96249ac860n/aNetWire185.244.29.175:7071
2020-03-05 21:16:045e01bc36aab882405b25f4695a91c0feVirustotal results 29 / 73 (39.73%) AgentTesla185.140.53.60:7071

# of entries: 3 (max: 100)