SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 7b579d4dc295bbc4d60570a44a77e0aa8e1d75db.

Database Entry


SHA1 Fingerprint:7b579d4dc295bbc4d60570a44a77e0aa8e1d75db
Certificate Common Name (CN):akaRAT
Issuer Distinguished Name (DN):akaRAT
TLS Version:TLS 1.2
First seen:2021-06-11 17:54:15 UTC
Last seen:2021-07-02 23:00:49 UTC
Status:Blacklisted
Listing reason:BitRAT C&C
Listing date:2021-06-12 05:37:21
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-07-02 23:00:499b994dcabfcbe22e199acbd93116428aVirustotal results 29 / 70 (41.43%) BitRAT212.192.241.42:4488
2021-07-02 23:00:499b994dcabfcbe22e199acbd93116428aVirustotal results 29 / 70 (41.43%) BitRAT212.192.241.42:4488
2021-06-11 17:54:15133a753c540bdcc6ce32a23959940c1cVirustotal results 46 / 70 (65.71%) BitRAT212.192.241.42:4488
2021-06-11 17:54:15133a753c540bdcc6ce32a23959940c1cVirustotal results 46 / 70 (65.71%) BitRAT212.192.241.42:4488

# of entries: 4 (max: 100)