SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint b0407930dcd7c38615c8e660c4d39121375b1172.

Database Entry


SHA1 Fingerprint:b0407930dcd7c38615c8e660c4d39121375b1172
Certificate Common Name (CN):AsyncRAT Server CA
Issuer Distinguished Name (DN):AsyncRAT Server CA
TLS Version:TLSv1' NOTBEFOR
First seen:2019-06-24 05:22:33 UTC
Last seen:2019-08-20 09:24:33 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2019-08-19 17:54:41
Malware samples:5
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2019-08-20 09:24:3312a25ea65d762c9e289eb6c2b8a01a86Virustotal results 21 / 69 (30.43%) RemcosRAT185.244.31.92:9341
2019-08-19 17:26:03a311cb3ef729c23349888b2213097695Virustotal results 42 / 69 (60.87%) AsyncRAT185.244.31.92:9341
2019-08-19 15:21:36a2c8fd26d524fb11b20972ba8cb9d6bcVirustotal results 31 / 66 (46.97%) RemcosRAT185.244.31.92:9341
2019-08-17 11:15:037494fe51ec048544f2f5d56b469cae49Virustotal results 41 / 70 (58.57%) RemcosRAT185.244.31.92:9341
2019-06-24 05:22:3394cc784cd6ab459d61872e6f2accb04dVirustotal results 14/71 (19.72%) RemcosRAT93.90.193.189:9341

# of entries: 5 (max: 100)