SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 83cf659616c22b7d3defb05775d60aef953ee6ca.
Database Entry
| SHA1 Fingerprint: | 83cf659616c22b7d3defb05775d60aef953ee6ca | 
|---|---|
| Certificate Common Name (CN): | Quasar Server CA | 
| Issuer Distinguished Name (DN): | Quasar Server CA | 
| TLS Version: | TLSv1' NOTBEFOR | 
| First seen: | 2019-11-13 20:41:32 UTC | 
| Last seen: | 2019-12-22 09:22:25 UTC | 
| Status: | Blacklisted | 
| Listing reason: | QuasarRAT C&C | 
| Listing date: | 2019-11-13 20:57:39 | 
| Malware samples: | 4 | 
| Botnet C&Cs: | 2 | 
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) | 
|---|---|---|---|---|
| 2019-12-22 09:22:25 | 2c612dfbe4f94f3a75e9e035a8b3b0c2 |  16 / 72 (22.22%) | Smoke Loader | 69.30.240.82:4358 | 
| 2019-12-22 09:22:25 | 2c612dfbe4f94f3a75e9e035a8b3b0c2 |  16 / 72 (22.22%) | Smoke Loader | 69.30.240.82:4358 | 
| 2019-11-20 03:18:55 | 614af0c30e329dd0067cc800093e9552 |  42 / 71 (59.15%) | 51.83.18.78:4358 | |
| 2019-11-20 03:18:55 | 614af0c30e329dd0067cc800093e9552 |  42 / 71 (59.15%) | 51.83.18.78:4358 | |
| 2019-11-18 07:53:09 | 551b4a01951a855404f184bff24cf4d3 |  39 / 68 (57.35%) | QuasarRAT | 51.83.18.78:4358 | 
| 2019-11-18 07:53:09 | 551b4a01951a855404f184bff24cf4d3 |  39 / 68 (57.35%) | QuasarRAT | 51.83.18.78:4358 | 
| 2019-11-13 20:41:32 | a4098b8faf323b8f3406325d0c37d8ed |  16 / 70 (22.86%) | QuasarRAT | 51.83.18.78:4358 | 
| 2019-11-13 20:41:32 | a4098b8faf323b8f3406325d0c37d8ed |  16 / 70 (22.86%) | QuasarRAT | 51.83.18.78:4358 | 
# of entries: 8 (max: 100)