SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint e12b8859e2195f69a0c4e8d7025d91c844cb8b49.
Database Entry
SHA1 Fingerprint: | e12b8859e2195f69a0c4e8d7025d91c844cb8b49 |
---|---|
Certificate Common Name (CN): | Quasar Server CA |
Issuer Distinguished Name (DN): | Quasar Server CA |
TLS Version: | TLS 1.2 |
First seen: | 2023-08-25 21:16:03 UTC |
Last seen: | 2023-08-26 05:01:20 UTC |
Status: | Blacklisted |
Listing reason: | QuasarRAT C&C |
Listing date: | 2023-08-26 08:16:57 |
Malware samples: | 3 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2023-08-26 05:01:20 | a22694ecc330877c14c622a338f099d5 | 64 / 71 (90.14%) | QuasarRAT | 193.142.146.212:4782 |
2023-08-26 01:20:02 | 8a1c6ab6aeeec522d4d2d483543cb6ad | 31 / 69 (44.93%) | QuasarRAT | 193.142.146.212:4782 |
2023-08-25 21:16:03 | 10391a2098f163fad5e1135951611bb2 | 40 / 66 (60.61%) | QuasarRAT | 193.142.146.212:4782 |
# of entries: 3 (max: 100)