SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ed2b5ba7e14516e39c0202ac062695e6b0484a89.

Database Entry


SHA1 Fingerprint:ed2b5ba7e14516e39c0202ac062695e6b0484a89
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1
First seen:2022-01-28 00:49:41 UTC
Last seen:never
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2022-01-28 07:00:28
Malware samples:1
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2022-01-28 00:49:411d142d1d500fdfbe3b7ef592a9a8895an/aAsyncRAT37.0.10.214:6171
2022-01-28 00:49:411d142d1d500fdfbe3b7ef592a9a8895an/aAsyncRAT37.0.10.214:6171

# of entries: 2 (max: 100)