SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint f51dd2f792020abd27bebc92a3226763c29793ac.

Database Entry


SHA1 Fingerprint:f51dd2f792020abd27bebc92a3226763c29793ac
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1
First seen:2021-06-18 17:19:44 UTC
Last seen:2021-06-21 01:44:03 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2021-06-19 05:44:46
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-06-21 01:44:03a0a44c7be42d745411116ad6e89f7314Virustotal results 47 / 70 (67.14%) AsyncRAT20.199.112.16:3535
2021-06-21 01:44:03a0a44c7be42d745411116ad6e89f7314Virustotal results 47 / 70 (67.14%) AsyncRAT20.199.112.16:3535
2021-06-18 17:19:4405633f6a8c4a6d559ccb685defee2536Virustotal results 46 / 69 (66.67%) AsyncRAT20.199.112.16:3535
2021-06-18 17:19:4405633f6a8c4a6d559ccb685defee2536Virustotal results 46 / 69 (66.67%) AsyncRAT20.199.112.16:3535

# of entries: 4 (max: 100)