SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 6e84d696e4435d9dfe93c100a9c15fc4302eb87d.
Database Entry
SHA1 Fingerprint: | 6e84d696e4435d9dfe93c100a9c15fc4302eb87d |
---|---|
Certificate Common Name (CN): | amcuh jayg |
Issuer Distinguished Name (DN): | amcuh jayg |
TLS Version: | TLS 1.2 |
First seen: | 2025-08-01 16:20:58 UTC |
Last seen: | 2025-08-01 19:41:59 UTC |
Status: | Blacklisted |
Listing reason: | QuasarRAT C&C |
Listing date: | 2025-08-03 15:40:47 |
Malware samples: | 3 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2025-08-01 19:41:59 | f84cc47335e5e6eb4e5dbb66f765e20d | n/a | 147.185.221.29:12318 | |
2025-08-01 19:37:30 | f81ceebe2bd697b084eb808a87d22581 | n/a | 147.185.221.29:12318 | |
2025-08-01 16:20:58 | d44da0fb35593240cb8431d8abeb40cb | n/a | 147.185.221.29:12318 |
# of entries: 3 (max: 100)