SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint c390e62881f25347c39cde51024a9c687d49675f.
Database Entry
SHA1 Fingerprint: | c390e62881f25347c39cde51024a9c687d49675f |
---|---|
Certificate Common Name (CN): | Quasar Server CA |
Issuer Distinguished Name (DN): | Quasar Server CA |
TLS Version: | TLS 1.2' NOTBEF |
First seen: | 2021-04-23 03:04:50 UTC |
Last seen: | 2022-10-11 15:54:59 UTC |
Status: | Blacklisted |
Listing reason: | QuasarRAT C&C |
Listing date: | 2022-10-12 17:09:46 |
Malware samples: | 4 |
Botnet C&Cs: | 2 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2022-10-11 15:54:59 | 6d605945322714ff6541e15e7af8781e | 41 / 70 (58.57%) | QuasarRAT | 194.5.98.38:4783 |
2021-07-31 20:04:42 | 32e8ffb78815eaceacb26f672f7e7db3 | 26 / 69 (37.68%) | QuasarRAT | 77.136.120.46:4783 |
2021-06-15 14:55:38 | b127f3a9da9a84ab311eeff6917b7bd6 | 23 / 69 (33.33%) | QuasarRAT | 194.5.98.38:4783 |
2021-04-23 03:04:50 | cb810b7e41302244c9ebea9587025ae4 | 25 / 70 (35.71%) | QuasarRAT | 194.5.98.38:4783 |
# of entries: 4 (max: 100)