SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint da448dda6268ce03d92fc37d182d05f749b1b24f.
Database Entry
| SHA1 Fingerprint: | da448dda6268ce03d92fc37d182d05f749b1b24f |
|---|---|
| Certificate Common Name (CN): | kbrkzu axcs |
| Issuer Distinguished Name (DN): | kbrkzu axcs |
| TLS Version: | TLS 1.2 |
| First seen: | 2025-07-30 03:41:02 UTC |
| Last seen: | 2025-07-30 06:09:17 UTC |
| Status: | Blacklisted |
| Listing reason: | QuasarRAT C&C |
| Listing date: | 2025-07-30 09:33:26 |
| Malware samples: | 3 |
| Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
|---|---|---|---|---|
| 2025-07-30 06:09:17 | 3069d72686bb791d0c49cdf128345798 | n/a | 193.161.193.99:50723 | |
| 2025-07-30 03:47:49 | 2c0267bcb32cb58a2370489308c3ded3 | n/a | 193.161.193.99:50723 | |
| 2025-07-30 03:41:02 | c016d9701ffae9f331131955daf436e6 | n/a | 193.161.193.99:50723 |
# of entries: 3 (max: 100)