SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 5471511e19eed1a64ef4ca4d4711948041745f21.

Database Entry


SHA1 Fingerprint:5471511e19eed1a64ef4ca4d4711948041745f21
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1' NOTBEFOR
First seen:2020-08-30 19:40:04 UTC
Last seen:2020-09-04 16:50:53 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2020-08-31 06:00:04
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-09-04 16:50:5378a52b89a09b90c974bf91d2f52a921bn/aAsyncRAT103.207.39.83:1024
2020-09-04 16:50:5378a52b89a09b90c974bf91d2f52a921bn/aAsyncRAT103.207.39.83:1024
2020-08-30 19:40:04ff67a0040556e6c67c3a2c680cc1ef01n/aAsyncRAT103.207.39.83:1024
2020-08-30 19:40:04ff67a0040556e6c67c3a2c680cc1ef01n/aAsyncRAT103.207.39.83:1024

# of entries: 4 (max: 100)