SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint b7eb651f8d91960b104d5019e1eadeaef50e652e.
Database Entry
SHA1 Fingerprint: | b7eb651f8d91960b104d5019e1eadeaef50e652e |
---|---|
Certificate Common Name (CN): | jerbg tjkxzm |
Issuer Distinguished Name (DN): | jerbg tjkxzm |
TLS Version: | TLS 1.2 |
First seen: | 2025-06-19 02:34:13 UTC |
Last seen: | 2025-07-19 09:09:46 UTC |
Status: | Blacklisted |
Listing reason: | QuasarRAT C&C |
Listing date: | 2025-06-19 06:12:27 |
Malware samples: | 4 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2025-07-19 09:09:46 | 952ead326d6af3aad11883877c34ac98 | n/a | 111.170.174.134:19198 | |
2025-07-16 20:51:03 | 0e9b602c19f8056158305945abb9e069 | n/a | 111.170.174.134:19198 | |
2025-06-20 06:03:43 | bd08bb51f157605b290c130ed1fb38bd | n/a | 111.170.174.134:19198 | |
2025-06-19 02:34:13 | 3f415a00c1c794110e23290dd62f2b01 | n/a | 111.170.174.134:19198 | |
2025-06-19 02:34:13 | 3f415a00c1c794110e23290dd62f2b01 | n/a | 111.170.174.134:19198 |
# of entries: 5 (max: 100)