SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ff6720e8f86f5ddc61c77488532fbf454687df0b.

Database Entry


SHA1 Fingerprint:ff6720e8f86f5ddc61c77488532fbf454687df0b
Certificate Common Name (CN):AsyncRAT Server
Issuer Distinguished Name (DN):AsyncRAT Server
TLS Version:TLSv1' NOTBEFOR
First seen:2020-06-08 01:04:14 UTC
Last seen:2020-06-30 12:05:16 UTC
Status:Blacklisted
Listing reason:AsyncRAT C&C
Listing date:2020-06-08 07:23:41
Malware samples:2
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-06-30 12:05:164e24269369805a1cfc023bb3f901fb13n/a185.140.53.21:8991
2020-06-30 12:05:164e24269369805a1cfc023bb3f901fb13n/a185.140.53.21:8991
2020-06-08 01:04:14c2f81dd5fdc8cc5ad3c9ad6c9ae68311Virustotal results 12 / 71 (16.90%) AsyncRAT193.161.193.99:21985
2020-06-08 01:04:14c2f81dd5fdc8cc5ad3c9ad6c9ae68311Virustotal results 12 / 71 (16.90%) AsyncRAT193.161.193.99:21985

# of entries: 4 (max: 100)