SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint b5e6473db864cad75cbb11f47c41121f6e84614c.

Database Entry


SHA1 Fingerprint:b5e6473db864cad75cbb11f47c41121f6e84614c
Certificate Common Name (CN):DarkEye Server
Issuer Distinguished Name (DN):DarkEye Server
TLS Version:TLSv1
First seen:2021-08-11 11:40:52 UTC
Last seen:2021-08-11 17:49:32 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2021-08-11 15:21:50
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-08-11 17:49:322ec3e02f2130ae26b1a3189c0fff5978Virustotal results 6 / 69 (8.70%) 109.248.201.153:8808
2021-08-11 11:40:5214c6d942188587ff0f29679de43a2528Virustotal results 40 / 65 (61.54%) AsyncRAT109.248.201.153:6606
2021-08-11 11:40:5214c6d942188587ff0f29679de43a2528Virustotal results 40 / 65 (61.54%) AsyncRAT109.248.201.153:6606

# of entries: 3 (max: 100)