SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 69a903dc37e5958d62b20ee9864c1cf735ed3546.

Database Entry


SHA1 Fingerprint:69a903dc37e5958d62b20ee9864c1cf735ed3546
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1' NOTBEFOR
First seen:2020-09-22 06:25:34 UTC
Last seen:2020-10-19 02:55:36 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2020-10-12 07:35:50
Malware samples:8
Botnet C&Cs:3

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-10-19 02:55:368634e8de0d174e40a3f54a9c9aea45b1n/aAsyncRAT178.33.222.241:2703
2020-10-12 05:47:29c8fc3a0abcb7611f58078bb390233d49n/aAsyncRAT37.120.208.36:49714
2020-09-30 05:26:01cfd4fe6ddd6f80d102b8faead2da8a28n/aAsyncRAT178.33.222.241:2703
2020-09-29 07:36:03a388de41e954030597fe94809af9d12cn/aAsyncRAT178.33.222.241:2703
2020-09-28 04:35:40a59ce843b6a068990fb89f652dc05fcan/aAsyncRAT178.33.222.241:2703
2020-09-28 03:00:5406f9746066bd9b82ca1b1d1bb8078215n/aAsyncRAT178.33.222.241:2703
2020-09-24 07:26:283b75eff3080beebf56ad48d5b4e908f7n/aAsyncRAT79.134.225.92:49746
2020-09-22 06:25:34c4e2670e4f2bfec4543c09d37b4f82e7n/aAsyncRAT178.33.222.241:49746

# of entries: 8 (max: 100)