SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 6dc62ba3d443223e31c419bc41882902663d5833.

Database Entry


SHA1 Fingerprint:6dc62ba3d443223e31c419bc41882902663d5833
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1' NOTBEFOR
First seen:2021-01-17 18:40:24 UTC
Last seen:2021-02-11 23:50:02 UTC
Status:Blacklisted
Listing reason:njrat C&C
Listing date:2021-01-18 06:53:30
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-02-11 23:50:02fad38cbecca2a71130d173e0324870b8Virustotal results 47 / 71 (66.20%) CoinMiner20.50.121.62:1604
2021-02-11 23:50:02fad38cbecca2a71130d173e0324870b8Virustotal results 47 / 71 (66.20%) CoinMiner20.50.121.62:1604
2021-02-10 20:34:152a5f64ea78d3c4d1742e6baca4b92c98Virustotal results 15 / 71 (21.13%) CoinMiner20.50.121.62:1604
2021-02-10 20:34:152a5f64ea78d3c4d1742e6baca4b92c98Virustotal results 15 / 71 (21.13%) CoinMiner20.50.121.62:1604
2021-01-17 18:40:244d5557e06c5f50770d5a94aa8bb8f6c5Virustotal results 36 / 62 (58.06%) njrat20.50.121.62:1604
2021-01-17 18:40:244d5557e06c5f50770d5a94aa8bb8f6c5Virustotal results 36 / 62 (58.06%) njrat20.50.121.62:1604

# of entries: 6 (max: 100)