SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint fcb2f09b7f23547520bf3ae4436d250d9802ecf6.

Database Entry


SHA1 Fingerprint:fcb2f09b7f23547520bf3ae4436d250d9802ecf6
Certificate Common Name (CN):DcRat
Issuer Distinguished Name (DN):Baxis, OU=qwqdanchun, O=DcRat By qwqdanchun, L=SH, C=CN
TLS Version:TLSv1
First seen:2022-01-24 20:30:17 UTC
Last seen:2022-01-29 14:35:27 UTC
Status:Blacklisted
Listing reason:RedLineStealer C&C
Listing date:2022-01-25 09:15:35
Malware samples:3
Botnet C&Cs:3

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2022-01-29 14:35:27e326c7b1573790be0681dcdc109e15a3Virustotal results 40 / 65 (61.54%) RedLineStealer18.189.106.45:12394
2022-01-29 14:35:27e326c7b1573790be0681dcdc109e15a3Virustotal results 40 / 65 (61.54%) RedLineStealer18.189.106.45:12394
2022-01-25 15:57:51b95cb76cec0b0c88a409403518559fb3Virustotal results 39 / 68 (57.35%) RedLineStealer3.128.107.74:16030
2022-01-25 15:57:51b95cb76cec0b0c88a409403518559fb3Virustotal results 39 / 68 (57.35%) RedLineStealer3.128.107.74:16030
2022-01-24 20:30:175ae748c103a50cdd6d338506a153caa6Virustotal results 38 / 67 (56.72%) RedLineStealer3.134.125.175:17709
2022-01-24 20:30:175ae748c103a50cdd6d338506a153caa6Virustotal results 38 / 67 (56.72%) RedLineStealer3.134.125.175:17709

# of entries: 6 (max: 100)