SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 936c784df6bfbcb86d89edf1da8425e6d70dcfbb.

Database Entry


SHA1 Fingerprint:936c784df6bfbcb86d89edf1da8425e6d70dcfbb
Certificate Common Name (CN):Quasar Server CA
Issuer Distinguished Name (DN):Quasar Server CA
TLS Version:TLS 1.2
First seen:2022-12-29 07:24:41 UTC
Last seen:2022-12-29 07:56:59 UTC
Status:Blacklisted
Listing reason:QuasarRAT C&C
Listing date:2022-12-29 07:57:52
Malware samples:4
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2022-12-29 07:56:59b08b88db0f73d88e352f98f1a7c1fb5fn/aQuasarRAT193.149.176.156:8080
2022-12-29 07:56:168b5aa9401c816b35efeeffa7140fe34cn/aQuasarRAT193.149.176.156:8080
2022-12-29 07:51:5283e9e4399d5c105c460d27207227b8deVirustotal results 53 / 72 (73.61%) QuasarRAT193.149.176.156:8080
2022-12-29 07:24:41225bee869cfc364982f132a8b9320f1eVirustotal results 49 / 72 (68.06%) QuasarRAT193.149.176.156:8080

# of entries: 4 (max: 100)