SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ce9d5068446a3372a70abe8ebd0d7f0cbc814b08.
Database Entry
| SHA1 Fingerprint: | ce9d5068446a3372a70abe8ebd0d7f0cbc814b08 | 
|---|---|
| Certificate Common Name (CN): | Quasar Server CA | 
| Issuer Distinguished Name (DN): | Quasar Server CA | 
| TLS Version: | TLS 1.2 | 
| First seen: | 2023-10-12 12:50:52 UTC | 
| Last seen: | 2023-10-13 05:03:08 UTC | 
| Status: | Blacklisted | 
| Listing reason: | QuasarRAT C&C | 
| Listing date: | 2023-10-13 11:03:24 | 
| Malware samples: | 2 | 
| Botnet C&Cs: | 1 | 
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) | 
|---|---|---|---|---|
| 2023-10-13 05:03:08 | b584210f26cf4eadf5593e767c78b916 |  20 / 72 (27.78%) | QuasarRAT | 185.17.0.246:1419 | 
| 2023-10-12 12:50:52 | c9abc0932559d7ecced02a9125acea05 |  13 / 72 (18.06%) | QuasarRAT | 185.17.0.246:1419 | 
# of entries: 2 (max: 100)