A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io

A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io

Published on

Tracking malicious infrastructure is critical to threat hunting and cyber threat intelligence. While traditional hunts focus on detecting compromises within an organization's environment, infrastructure hunting shifts the defender's focus outward, mapping attacker operations before they reach the network.

Threat actors rarely operate from a single server. Instead, they use clusters of domains, IP addresses, and network resources to stage malware, manage command-and-control (C2), and evade detection.

In this post, we walk through how to hunt malicious infrastructure using scan data and certificate analysis. Starting with a single IP address associated with AsyncRAT, we pivot through ports, certificates, and TLS fingerprints to uncover a wider cluster of related systems. By following these indicators, defenders can take a proactive approach, turning isolated data points into a clearer picture of adversary C2 activity.

Step 1: Finding a Starting Point

Every hunt begins somewhere. Sometimes, it starts with a clear lead: an IP address found in a threat feed like IOC Hunter, a domain listed as an indicator of compromise (IoC) in a security report, or an alert in a security incident and event monitoring (SIEM) system. It can also begin with a hunch-an unusual connection in a firewall log or a pattern in network traffic that stands out.

Websites like MalwareBazaar and ThreatFox regularly publish indicators linked to malware infrastructure, making them valuable investigative sources. Discussions on X can also surface real-time threat activity, offering additional context on C2 tactics.

Our investigation starts with 37.72.172[.]58, an IP recently identified in Hunt's internet scans. The server has been associated with AsyncRAT activity, a remote access trojan commonly used to control infected Windows systems, enabling attackers to execute commands, steal data, and monitor victims remotely.

While we know it's associated with suspicious activity, the focus here isn't on attribution; it's on analyzing the IP and uncovering related infrastructure.

Open a text editor or grab a notebook, and follow along as we walk through each step.

Step 2: Querying the IP in Hunt

We'll start by entering the IP into Hunt's search bar. In addition to IP addresses, users can also conduct lookups of domains, ASNs, and even threat actor names. If you haven't checked out our post on the reimagining of Hunt.io with an infrastructure-first approach to threat intelligence, please do.

By default, we are dropped into the Info tab (Figure 1).

Figure 1Figure 1. IP overview for our suspicious IP in Hunt.

Breaking Down the Overview Page

The Overview page immediately shows where this IP is hosted, which ports are open, and whether DNS records are associated with it. The Info tab is a starting point, providing key details like the hosting provider, ASN, and software. While this alone won't confirm malicious activity, it helps researchers and defenders decide whether an IP warrants further analysis.

Several other tabs will assist in our hunt going forward:

  • Domains - Displays any domain names that have resolved to the IP.

  • Associations - Quickly identifies connections to additional infrastructure through shared SSH keys, TLS certificates, and IOCs.

  • SSL History - Logs past TLS certificates used by the IP, making it an essential tool for tracking infrastructure reuse.

These tabs will assist us as we continue investigating, offering immediate pivot points that help us map out the surrounding infrastructure.

Step 3: Analyzing ASN & Domain Data

Staying within the overview page, we can see the IP address in question is hosted by HIVELOCITY, Inc. (AS29802) in Los Angeles, California. HIVELOCITY, Inc. provides dedicated server hosting, colocation, and cloud solutions with data centers across the globe. They focus on delivering high-performance infrastructure and 24/7 customer support.

A closer look at the Domain tab reveals 14 hostnames resolving to our IP.

Figure 2Figure 2. Domain overview in Hunt.

Examples include:

  • mooma.ooguy[.]com

  • milan.giize[.]com

  • remvan.kozow[.]com

  • angxo.kozow[.]com

  • boty.theworkpc[.]com

  • nevbelo.giize[.]com

  • mosstre.theworkpc[.]com

  • whatsupdate.ooguy[.]com

  • iinupdate.giize[.]com

  • a7a.giize[.]com

Many of these domains are hosted using Dynu, a free dynamic DNS provider. Threat actors frequently abuse dynamic DNS services because they allow domains to remain constant while the underlying IP infrastructure changes. This provides attackers with flexibility when operating command-and-control servers.

The presence of multiple dynamic DNS hostnames resolving to the same IP address suggests this system is not typical shared hosting. Instead, it appears to be a dedicated server being used for command-and-control infrastructure.

At this stage, we've established:

  • An IP associated with AsyncRAT activity

  • Multiple domains from dynamic DNS providers

  • A dedicated hosting provider

Starting your hunt by analyzing domain names provides insight into how a server is likely being used, offering an early look at the threat actor's intent before examining the ports and services.

Step 4: Ports, Services, and Server Responses

Network ports tell the story of a server's purpose on the internet, whether for malware delivery, phishing, or command-and-control (C2). The ports that are exposed, the protocols in use, and how services respond can reveal unique patterns that can be used to track malicious activity.

Our suspect IP exposes a wide range of ports, including 443, 4212, 5357, 5985, 6066, 6606, 7000, 7707, 8088, 8808, 33890, and 47001. Several of these ports have been observed hosting services associated with AsyncRAT, while others return responses consistent with Windows HTTP services and proxy infrastructure.

Examining Protocol Responses

Looking at the port history, multiple TLS ports were flagged with AsyncRAT activity, including 6066, 6606, 7000, 7707, 8088, and 8808. These ports were first observed between December 2025 and January 2026 and remained active through early March 2026.

Figure 3Figure 3. Hunt's Intelligence on IP Address "37.72.172[.]58" shows maximum ports attributed to AsyncRAT activities.

Examining the response data further reveals several interesting characteristics.

Port 22 returns an SSH banner identifying the service as OpenSSH_9.6p1 running on Ubuntu, indicating the server is likely managed through a Linux environment. Port 443, which typically hosts HTTPS services, returns an error indicating that an HTTP request was sent to an HTTPS server, suggesting TLS is enabled but no standard web application is running.

Additional HTTP services appear on ports 5357, 5985, and 47001, all returning responses from Microsoft-HTTPAPI/2.0. These ports are commonly associated with Windows HTTP services and Windows Remote Management (WinRM).

More revealing are the TLS responses observed across the AsyncRAT ports. Within the TLS handshake data, we repeatedly see a certificate subject containing the string:

AsyncRAT Server

Figure 4Figure 4. Protocol Header data from Hunt.io Protocol history of ports and services for IP addresses.

To understand how frequently the AsyncRAT Server string appears within Hunt's scan data, we created a HuntSQL query using the protocol dataset. By searching for occurrences of the string within captured header data, we can identify additional servers exposing the same characteristic response.

Example Query:

SELECT
  *
FROM
  protocol
WHERE
  data LIKE '%AsyncRAT%'

                
Copy

Example Output:

Figure 5Figure 5. Hunt SQL results after querying for the AsyncRAT string inside protocol responses.

Running this query returns 96 results, confirming that the AsyncRAT response pattern is present across multiple systems in the dataset.

This reinforces the value of protocol response data during infrastructure hunting, as unique strings embedded within TLS or service responses can act as reliable fingerprints for identifying related malware servers.

At this stage of the investigation, the port and protocol data provide strong evidence that the IP address is operating as part of an AsyncRAT C2 infrastructure, exposing multiple listener ports alongside supporting services that may help manage or proxy attacker traffic.

Step 5: Analyzing TLS Certificates for Clues

TLS certificates are a valuable tool for tracking adversary infrastructure. Unlike domains and IP addresses, which are easy to change, certificates often persist across multiple systems, exposing connections that threat actors might try to obscure. Whether issued by a legitimate Certificate Authority or self-signed, TLS data can reveal patterns that help analysts identify related activity before an operation gains traction.

In Hunt.io, the SSL History tabprovides a timeline of certificates previously used on the server, offering valuable context on how the IP has been configured over time. In this case, we see three interesting certificates from February 12th, giving us a fresh lead to explore.

Figure 6Figure 6. SSL History in Hunt.

One of the most notable certificates has the subject common name "AsyncRAT Server" and was first issued on April 25, 2022, and is configured to expire on December 31, 2105, an unusually long validity period that is typical of self-signed certificates generated by malware frameworks.

The 'Certificate Details' view provides key metadata, including the validity period, SHA-256 fingerprint, and JA4X hash.

Figure 7Figure 7. AsyncRAT Certificate data in Hunt.

The certificate is self-issued, meaning the issuer and subject are identical, another common characteristic of malware command-and-control infrastructure.

SHA256: 136FBFD2D255A7FC69C16FE115138D7A53ED0A7DB8302017EE0E692B42D82FFE
CN: AsyncRAT Server
Issued: 2022-04-25
Expires: 2105-12-31

                
Copy

On port 443, the server began presenting a completely different certificate associated with Fennec RAT. Two separate Fennec certificates were observed within a short time window. The first certificate was issued on February 25, 2026, while a second certificate was generated on March 4, 2026, suggesting the operator may have rotated or regenerated the certificate.

SHA256: 708717BA69DF5A4AC91A7358C2D0316A7F047AF8B5332FEBC9FE9C892458E025
CN: Fennec RAT Server
Organization: Fennec Security
Issued: 2026-02-25
Expires: 2036-02-23

                
Copy
SHA256: 49F0E51F391AD0E8C2571D70A9D95D835CA70A71F4D0AE6D4E0EA7D9AE68AB80
CN: Fennec RAT Server
Organization: Fennec Security
Issued: 2026-03-04\
Expires: 2036-03-01

                
Copy
Figure 8Figure 8. One of the Fennec RAT Certificate data in Hunt.

Both certificates share identical structural characteristics and include the organization field "Fennec Security." The JA4X TLS fingerprint also remains consistent between them, indicating they were likely generated using the same certificate creation process or toolkit.

To better understand whether this certificate appears elsewhere in the certificate dataset, we crafted HuntSQL to pivot on the issuer common name "Fennec RAT Server."

Example Query:

SELECT
  ip,
  port,
  min(timestamp),
  max(timestamp)
FROM
  certificates
WHERE
  issuer.common_name == "Fennec RAT Server"
  AND timestamp > NOW - 30 DAY
GROUP BY
  ip,
  port

                
Copy

Example Output:

Figure 9Figure 9. Pivot on Fennec RAT Server Certificate Details using HuntSQL query to find new similar IP addresses.

This query returns 3 additional IP addresses that have recently presented the same certificate issuer.

The presence of multiple hosts using certificates issued by "Fennec RAT Server" suggests that this infrastructure may be part of a broader cluster of systems associated with the same malware toolkit or operator.

Before moving forward, we'll record AsyncRAT certificate hashes for tracking:

SHA-256 Fingerprint:
136FBFD2D255A7FC69C16FE115138D7A53ED0A7DB8302017EE0E692B42D82FFE
JA4X Hash:
7022c563de38_7022c563de38_0147df7a0c11

                
Copy

What is JA4X?

JA4X, part of the JA4+ fingerprinting suite, provides a powerful way to track TLS certificates based on how they are generated rather than their specific values. Instead of relying on standard certificate hashes, which change when a cert is reissued, JA4X fingerprints the underlying structure, making it useful for linking malware C2 servers.

Step 6: Let's Build A Query!

While certificate hashes can change when a certificate is regenerated, TLS fingerprinting techniques such as JA4X allow researchers to track certificates based on how they are generated rather than their exact values.

Using the JA4X fingerprint associated with the AsyncRAT certificate, we can search Hunt's scan dataset for matching servers.

To build our HuntSQL query, we'll match the JA4X hash and the subject common name ('AsyncRAT Server') to uncover other servers with identical certificate structures.

Example Query:

SELECT
  ip,
  subject.common_name
FROM
  certificates
WHERE
  subject.common_name == "AsyncRAT Server"
  AND ja4x.full == "7022c563de38_7022c563de38_0147df7a0c11"
  AND timestamp > NOW - 30 DAY
GROUP BY
  ip,
  subject.common_name

                
Copy

Example Output:

Figure 10Figure 10. HuntSQL query shows 73 results having a similar Ja4x fingerprint with the AsyncRAT subject common name.

The results return 73 servers across Hunt's dataset. A result set of this size indicates that the AsyncRAT certificate structure is reused across a larger infrastructure cluster. This confirms that the server we started with is not operating in isolation but is part of a wider ecosystem of AsyncRAT command-and-control infrastructure.

Conclusion

Hunting and tracking adversary infrastructure requires persistence, creativity, and a structured approach to analyzing multiple data points. Starting with a single IP, we leveraged Hunt to examine domains, ports, HTTP responses, and TLS certificates, ultimately identifying potential connections that could expand an investigation. While not every lead will result in a direct pivot, refining your methodology and layering intelligence sources will improve the ability to track threat actor operations over time.

Tips for Getting Started

  1. Start Small, Expand Methodically - A single IP, domain, or certificate can reveal hidden overlaps, but avoid jumping too quickly between data points-build a foundation first.

  2. Look for Patterns, Not Just IOCs - Threat actors reuse hosting providers, SSL configurations, and infrastructure tactics, so focus on behavioral fingerprints rather than isolated indicators.

  3. Use Multiple Intelligence Sources - No single dataset is perfect. Correlate findings across Hunt, passive DNS, WHOIS records, and threat intel feeds to validate and expand investigations.

Infrastructure Identified via Certificate Pivoting

IPMalwareCountryASNCompany
107.172.31.102AsyncRATUSAS36352CloudIT
107.172.10.190AsyncRATUSAS36352HostPapa
109.115.66.21AsyncRATITAS30722Vodafone Italia
118.99.99.72AsyncRATIDAS17451metroNET By Biznet
130.12.181.114AsyncRATDEAS36680Netiface LLC
136.116.198.124AsyncRATUSAS396982Google LLC
104.243.248.63AsyncRATDEAS3223VOXILITY-DE
151.241.113.151AsyncRATUSAS63473HostHatch
15.235.151.217AsyncRATSGAS16276OVH
138.252.132.58AsyncRATVNAS154339Zyn Data Technology
165.227.115.71AsyncRATUSAS14061DigitalOcean
154.38.185.247AsyncRATUSAS40021Contabo
155.94.128.2Fennec RATUSAS23273HostPapa
162.243.20.131AsyncRATUSAS14061DigitalOcean
157.20.182.25AsyncRATNLAS152485Hosterdaddy
157.20.182.24AsyncRATNLAS152485Hosterdaddy
115.75.66.68AsyncRATVNAS7552Viettel Group
107.172.31.101AsyncRATUSAS36352CloudIT
178.16.55.142AsyncRATNLAS202412OMEGATECH
144.172.91.208AsyncRATUSAS14956RouterHosting
144.126.159.54AsyncRATUSAS40021Contabo
178.16.55.108AsyncRATNLAS202412OMEGATECH
176.65.132.128AsyncRATNLAS51396VMHeaven
172.111.151.97AsyncRATUSAS9009Internet Security US
173.211.46.18AsyncRATUSAS212238Internet Utilities NA
169.40.135.7AsyncRATDEAS209274TerraTransit AG
191.93.118.254AsyncRATCOAS27831Colombia Móvil
144.126.149.104AsyncRATUSAS40021Contabo
185.44.66.103AsyncRATUSAS49683MASSIVEGRID LTD
185.241.211.23AsyncRATUSAS2105581337 Services GmbH
158.94.208.206AsyncRATDEAS202412OMEGATECH
185.203.240.170AsyncRATPLAS210895Podaon SIA
162.243.28.13AsyncRATUSAS14061DigitalOcean
185.196.9.158AsyncRATCHAS42624Global-Data System
158.94.208.111AsyncRATDEAS202412OMEGATECH
178.16.54.184AsyncRATNLAS202412OMEGATECH
178.173.247.44AsyncRATUSAS931Krixe Pte. Ltd.
178.16.54.125AsyncRATNLAS202412OMEGATECH
203.188.171.16AsyncRATUSAS193181337 Services GmbH
193.26.115.183AsyncRATUSAS2105581337 Services GmbH
196.251.107.104AsyncRATDEAS214351internet-security
195.66.215.248AsyncRATUAAS30860Virtual Systems LLC
209.54.101.176AsyncRATUSAS36352Mullvad VPN
193.142.146.179AsyncRATNLAS213438ColocaTel Datacenter
188.227.197.38AsyncRATCAAS400897PetroSky
188.137.176.37AsyncRATNLAS211381Podaon SIA
194.164.96.98Fennec RATGBAS212027
45.55.159.168AsyncRATUSAS14061DigitalOcean
207.231.111.146AsyncRATUSAS62633HostRush
216.126.224.83AsyncRATUSAS14956RouterHosting
37.72.172.58Fennec RATUSAS29802Hivelocity LLC
38.255.58.201AsyncRATGBAS931Hyonix
211.197.94.135AsyncRATKRAS4766Korea Telecom
3.234.97.76AsyncRATUSAS14618Amazon AWS
23.95.106.22AsyncRATUSAS36352HostPapa
64.89.163.73AsyncRATDEAS401626Meowcore Softworks
45.84.198.55AsyncRATDEAS49581Mo's Operations GmbH
51.89.110.168AsyncRATDEAS16276OVH
213.152.161.48AsyncRATNLAS49453AirVPN
67.210.97.27AsyncRATUSAS398256Internet Utilities NA
66.165.255.14Fennec RATUSAS29802Hivelocity
50.114.206.110AsyncRATUSAS62564Ace Data Centers
83.243.122.167AsyncRATATAS57169EDIS Infrastructure
85.209.120.47AsyncRATTRAS205463VDS GLOBAL
67.211.213.203AsyncRATUSAS19318Interserver
74.81.49.18AsyncRATUSAS22439Perfect International
62.182.80.175AsyncRATUAAS30860Virtual Systems LLC
84.200.73.102AsyncRATDEAS214036UltaHost
85.17.54.227AsyncRATNLAS60781InnoSys ICT
91.92.241.103AsyncRATNLAS202412OMEGATECH
75.69.164.4AsyncRATUSAS7922Comcast Cable
91.92.241.142AsyncRATNLAS202412OMEGATECH
217.216.32.194AsyncRATSGAS141995Contabo GmbH
94.154.35.73AsyncRATNLAS202412
45.9.156.30AsyncRATBGAS211619MAXKO
91.231.222.220AsyncRATSIAS36680Kavoshgar Rayaneh Mozhan

Tracking malicious infrastructure is critical to threat hunting and cyber threat intelligence. While traditional hunts focus on detecting compromises within an organization's environment, infrastructure hunting shifts the defender's focus outward, mapping attacker operations before they reach the network.

Threat actors rarely operate from a single server. Instead, they use clusters of domains, IP addresses, and network resources to stage malware, manage command-and-control (C2), and evade detection.

In this post, we walk through how to hunt malicious infrastructure using scan data and certificate analysis. Starting with a single IP address associated with AsyncRAT, we pivot through ports, certificates, and TLS fingerprints to uncover a wider cluster of related systems. By following these indicators, defenders can take a proactive approach, turning isolated data points into a clearer picture of adversary C2 activity.

Step 1: Finding a Starting Point

Every hunt begins somewhere. Sometimes, it starts with a clear lead: an IP address found in a threat feed like IOC Hunter, a domain listed as an indicator of compromise (IoC) in a security report, or an alert in a security incident and event monitoring (SIEM) system. It can also begin with a hunch-an unusual connection in a firewall log or a pattern in network traffic that stands out.

Websites like MalwareBazaar and ThreatFox regularly publish indicators linked to malware infrastructure, making them valuable investigative sources. Discussions on X can also surface real-time threat activity, offering additional context on C2 tactics.

Our investigation starts with 37.72.172[.]58, an IP recently identified in Hunt's internet scans. The server has been associated with AsyncRAT activity, a remote access trojan commonly used to control infected Windows systems, enabling attackers to execute commands, steal data, and monitor victims remotely.

While we know it's associated with suspicious activity, the focus here isn't on attribution; it's on analyzing the IP and uncovering related infrastructure.

Open a text editor or grab a notebook, and follow along as we walk through each step.

Step 2: Querying the IP in Hunt

We'll start by entering the IP into Hunt's search bar. In addition to IP addresses, users can also conduct lookups of domains, ASNs, and even threat actor names. If you haven't checked out our post on the reimagining of Hunt.io with an infrastructure-first approach to threat intelligence, please do.

By default, we are dropped into the Info tab (Figure 1).

Figure 1Figure 1. IP overview for our suspicious IP in Hunt.

Breaking Down the Overview Page

The Overview page immediately shows where this IP is hosted, which ports are open, and whether DNS records are associated with it. The Info tab is a starting point, providing key details like the hosting provider, ASN, and software. While this alone won't confirm malicious activity, it helps researchers and defenders decide whether an IP warrants further analysis.

Several other tabs will assist in our hunt going forward:

  • Domains - Displays any domain names that have resolved to the IP.

  • Associations - Quickly identifies connections to additional infrastructure through shared SSH keys, TLS certificates, and IOCs.

  • SSL History - Logs past TLS certificates used by the IP, making it an essential tool for tracking infrastructure reuse.

These tabs will assist us as we continue investigating, offering immediate pivot points that help us map out the surrounding infrastructure.

Step 3: Analyzing ASN & Domain Data

Staying within the overview page, we can see the IP address in question is hosted by HIVELOCITY, Inc. (AS29802) in Los Angeles, California. HIVELOCITY, Inc. provides dedicated server hosting, colocation, and cloud solutions with data centers across the globe. They focus on delivering high-performance infrastructure and 24/7 customer support.

A closer look at the Domain tab reveals 14 hostnames resolving to our IP.

Figure 2Figure 2. Domain overview in Hunt.

Examples include:

  • mooma.ooguy[.]com

  • milan.giize[.]com

  • remvan.kozow[.]com

  • angxo.kozow[.]com

  • boty.theworkpc[.]com

  • nevbelo.giize[.]com

  • mosstre.theworkpc[.]com

  • whatsupdate.ooguy[.]com

  • iinupdate.giize[.]com

  • a7a.giize[.]com

Many of these domains are hosted using Dynu, a free dynamic DNS provider. Threat actors frequently abuse dynamic DNS services because they allow domains to remain constant while the underlying IP infrastructure changes. This provides attackers with flexibility when operating command-and-control servers.

The presence of multiple dynamic DNS hostnames resolving to the same IP address suggests this system is not typical shared hosting. Instead, it appears to be a dedicated server being used for command-and-control infrastructure.

At this stage, we've established:

  • An IP associated with AsyncRAT activity

  • Multiple domains from dynamic DNS providers

  • A dedicated hosting provider

Starting your hunt by analyzing domain names provides insight into how a server is likely being used, offering an early look at the threat actor's intent before examining the ports and services.

Step 4: Ports, Services, and Server Responses

Network ports tell the story of a server's purpose on the internet, whether for malware delivery, phishing, or command-and-control (C2). The ports that are exposed, the protocols in use, and how services respond can reveal unique patterns that can be used to track malicious activity.

Our suspect IP exposes a wide range of ports, including 443, 4212, 5357, 5985, 6066, 6606, 7000, 7707, 8088, 8808, 33890, and 47001. Several of these ports have been observed hosting services associated with AsyncRAT, while others return responses consistent with Windows HTTP services and proxy infrastructure.

Examining Protocol Responses

Looking at the port history, multiple TLS ports were flagged with AsyncRAT activity, including 6066, 6606, 7000, 7707, 8088, and 8808. These ports were first observed between December 2025 and January 2026 and remained active through early March 2026.

Figure 3Figure 3. Hunt's Intelligence on IP Address "37.72.172[.]58" shows maximum ports attributed to AsyncRAT activities.

Examining the response data further reveals several interesting characteristics.

Port 22 returns an SSH banner identifying the service as OpenSSH_9.6p1 running on Ubuntu, indicating the server is likely managed through a Linux environment. Port 443, which typically hosts HTTPS services, returns an error indicating that an HTTP request was sent to an HTTPS server, suggesting TLS is enabled but no standard web application is running.

Additional HTTP services appear on ports 5357, 5985, and 47001, all returning responses from Microsoft-HTTPAPI/2.0. These ports are commonly associated with Windows HTTP services and Windows Remote Management (WinRM).

More revealing are the TLS responses observed across the AsyncRAT ports. Within the TLS handshake data, we repeatedly see a certificate subject containing the string:

AsyncRAT Server

Figure 4Figure 4. Protocol Header data from Hunt.io Protocol history of ports and services for IP addresses.

To understand how frequently the AsyncRAT Server string appears within Hunt's scan data, we created a HuntSQL query using the protocol dataset. By searching for occurrences of the string within captured header data, we can identify additional servers exposing the same characteristic response.

Example Query:

SELECT
  *
FROM
  protocol
WHERE
  data LIKE '%AsyncRAT%'

                
Copy

Example Output:

Figure 5Figure 5. Hunt SQL results after querying for the AsyncRAT string inside protocol responses.

Running this query returns 96 results, confirming that the AsyncRAT response pattern is present across multiple systems in the dataset.

This reinforces the value of protocol response data during infrastructure hunting, as unique strings embedded within TLS or service responses can act as reliable fingerprints for identifying related malware servers.

At this stage of the investigation, the port and protocol data provide strong evidence that the IP address is operating as part of an AsyncRAT C2 infrastructure, exposing multiple listener ports alongside supporting services that may help manage or proxy attacker traffic.

Step 5: Analyzing TLS Certificates for Clues

TLS certificates are a valuable tool for tracking adversary infrastructure. Unlike domains and IP addresses, which are easy to change, certificates often persist across multiple systems, exposing connections that threat actors might try to obscure. Whether issued by a legitimate Certificate Authority or self-signed, TLS data can reveal patterns that help analysts identify related activity before an operation gains traction.

In Hunt.io, the SSL History tabprovides a timeline of certificates previously used on the server, offering valuable context on how the IP has been configured over time. In this case, we see three interesting certificates from February 12th, giving us a fresh lead to explore.

Figure 6Figure 6. SSL History in Hunt.

One of the most notable certificates has the subject common name "AsyncRAT Server" and was first issued on April 25, 2022, and is configured to expire on December 31, 2105, an unusually long validity period that is typical of self-signed certificates generated by malware frameworks.

The 'Certificate Details' view provides key metadata, including the validity period, SHA-256 fingerprint, and JA4X hash.

Figure 7Figure 7. AsyncRAT Certificate data in Hunt.

The certificate is self-issued, meaning the issuer and subject are identical, another common characteristic of malware command-and-control infrastructure.

SHA256: 136FBFD2D255A7FC69C16FE115138D7A53ED0A7DB8302017EE0E692B42D82FFE
CN: AsyncRAT Server
Issued: 2022-04-25
Expires: 2105-12-31

                
Copy

On port 443, the server began presenting a completely different certificate associated with Fennec RAT. Two separate Fennec certificates were observed within a short time window. The first certificate was issued on February 25, 2026, while a second certificate was generated on March 4, 2026, suggesting the operator may have rotated or regenerated the certificate.

SHA256: 708717BA69DF5A4AC91A7358C2D0316A7F047AF8B5332FEBC9FE9C892458E025
CN: Fennec RAT Server
Organization: Fennec Security
Issued: 2026-02-25
Expires: 2036-02-23

                
Copy
SHA256: 49F0E51F391AD0E8C2571D70A9D95D835CA70A71F4D0AE6D4E0EA7D9AE68AB80
CN: Fennec RAT Server
Organization: Fennec Security
Issued: 2026-03-04\
Expires: 2036-03-01

                
Copy
Figure 8Figure 8. One of the Fennec RAT Certificate data in Hunt.

Both certificates share identical structural characteristics and include the organization field "Fennec Security." The JA4X TLS fingerprint also remains consistent between them, indicating they were likely generated using the same certificate creation process or toolkit.

To better understand whether this certificate appears elsewhere in the certificate dataset, we crafted HuntSQL to pivot on the issuer common name "Fennec RAT Server."

Example Query:

SELECT
  ip,
  port,
  min(timestamp),
  max(timestamp)
FROM
  certificates
WHERE
  issuer.common_name == "Fennec RAT Server"
  AND timestamp > NOW - 30 DAY
GROUP BY
  ip,
  port

                
Copy

Example Output:

Figure 9Figure 9. Pivot on Fennec RAT Server Certificate Details using HuntSQL query to find new similar IP addresses.

This query returns 3 additional IP addresses that have recently presented the same certificate issuer.

The presence of multiple hosts using certificates issued by "Fennec RAT Server" suggests that this infrastructure may be part of a broader cluster of systems associated with the same malware toolkit or operator.

Before moving forward, we'll record AsyncRAT certificate hashes for tracking:

SHA-256 Fingerprint:
136FBFD2D255A7FC69C16FE115138D7A53ED0A7DB8302017EE0E692B42D82FFE
JA4X Hash:
7022c563de38_7022c563de38_0147df7a0c11

                
Copy

What is JA4X?

JA4X, part of the JA4+ fingerprinting suite, provides a powerful way to track TLS certificates based on how they are generated rather than their specific values. Instead of relying on standard certificate hashes, which change when a cert is reissued, JA4X fingerprints the underlying structure, making it useful for linking malware C2 servers.

Step 6: Let's Build A Query!

While certificate hashes can change when a certificate is regenerated, TLS fingerprinting techniques such as JA4X allow researchers to track certificates based on how they are generated rather than their exact values.

Using the JA4X fingerprint associated with the AsyncRAT certificate, we can search Hunt's scan dataset for matching servers.

To build our HuntSQL query, we'll match the JA4X hash and the subject common name ('AsyncRAT Server') to uncover other servers with identical certificate structures.

Example Query:

SELECT
  ip,
  subject.common_name
FROM
  certificates
WHERE
  subject.common_name == "AsyncRAT Server"
  AND ja4x.full == "7022c563de38_7022c563de38_0147df7a0c11"
  AND timestamp > NOW - 30 DAY
GROUP BY
  ip,
  subject.common_name

                
Copy

Example Output:

Figure 10Figure 10. HuntSQL query shows 73 results having a similar Ja4x fingerprint with the AsyncRAT subject common name.

The results return 73 servers across Hunt's dataset. A result set of this size indicates that the AsyncRAT certificate structure is reused across a larger infrastructure cluster. This confirms that the server we started with is not operating in isolation but is part of a wider ecosystem of AsyncRAT command-and-control infrastructure.

Conclusion

Hunting and tracking adversary infrastructure requires persistence, creativity, and a structured approach to analyzing multiple data points. Starting with a single IP, we leveraged Hunt to examine domains, ports, HTTP responses, and TLS certificates, ultimately identifying potential connections that could expand an investigation. While not every lead will result in a direct pivot, refining your methodology and layering intelligence sources will improve the ability to track threat actor operations over time.

Tips for Getting Started

  1. Start Small, Expand Methodically - A single IP, domain, or certificate can reveal hidden overlaps, but avoid jumping too quickly between data points-build a foundation first.

  2. Look for Patterns, Not Just IOCs - Threat actors reuse hosting providers, SSL configurations, and infrastructure tactics, so focus on behavioral fingerprints rather than isolated indicators.

  3. Use Multiple Intelligence Sources - No single dataset is perfect. Correlate findings across Hunt, passive DNS, WHOIS records, and threat intel feeds to validate and expand investigations.

Infrastructure Identified via Certificate Pivoting

IPMalwareCountryASNCompany
107.172.31.102AsyncRATUSAS36352CloudIT
107.172.10.190AsyncRATUSAS36352HostPapa
109.115.66.21AsyncRATITAS30722Vodafone Italia
118.99.99.72AsyncRATIDAS17451metroNET By Biznet
130.12.181.114AsyncRATDEAS36680Netiface LLC
136.116.198.124AsyncRATUSAS396982Google LLC
104.243.248.63AsyncRATDEAS3223VOXILITY-DE
151.241.113.151AsyncRATUSAS63473HostHatch
15.235.151.217AsyncRATSGAS16276OVH
138.252.132.58AsyncRATVNAS154339Zyn Data Technology
165.227.115.71AsyncRATUSAS14061DigitalOcean
154.38.185.247AsyncRATUSAS40021Contabo
155.94.128.2Fennec RATUSAS23273HostPapa
162.243.20.131AsyncRATUSAS14061DigitalOcean
157.20.182.25AsyncRATNLAS152485Hosterdaddy
157.20.182.24AsyncRATNLAS152485Hosterdaddy
115.75.66.68AsyncRATVNAS7552Viettel Group
107.172.31.101AsyncRATUSAS36352CloudIT
178.16.55.142AsyncRATNLAS202412OMEGATECH
144.172.91.208AsyncRATUSAS14956RouterHosting
144.126.159.54AsyncRATUSAS40021Contabo
178.16.55.108AsyncRATNLAS202412OMEGATECH
176.65.132.128AsyncRATNLAS51396VMHeaven
172.111.151.97AsyncRATUSAS9009Internet Security US
173.211.46.18AsyncRATUSAS212238Internet Utilities NA
169.40.135.7AsyncRATDEAS209274TerraTransit AG
191.93.118.254AsyncRATCOAS27831Colombia Móvil
144.126.149.104AsyncRATUSAS40021Contabo
185.44.66.103AsyncRATUSAS49683MASSIVEGRID LTD
185.241.211.23AsyncRATUSAS2105581337 Services GmbH
158.94.208.206AsyncRATDEAS202412OMEGATECH
185.203.240.170AsyncRATPLAS210895Podaon SIA
162.243.28.13AsyncRATUSAS14061DigitalOcean
185.196.9.158AsyncRATCHAS42624Global-Data System
158.94.208.111AsyncRATDEAS202412OMEGATECH
178.16.54.184AsyncRATNLAS202412OMEGATECH
178.173.247.44AsyncRATUSAS931Krixe Pte. Ltd.
178.16.54.125AsyncRATNLAS202412OMEGATECH
203.188.171.16AsyncRATUSAS193181337 Services GmbH
193.26.115.183AsyncRATUSAS2105581337 Services GmbH
196.251.107.104AsyncRATDEAS214351internet-security
195.66.215.248AsyncRATUAAS30860Virtual Systems LLC
209.54.101.176AsyncRATUSAS36352Mullvad VPN
193.142.146.179AsyncRATNLAS213438ColocaTel Datacenter
188.227.197.38AsyncRATCAAS400897PetroSky
188.137.176.37AsyncRATNLAS211381Podaon SIA
194.164.96.98Fennec RATGBAS212027
45.55.159.168AsyncRATUSAS14061DigitalOcean
207.231.111.146AsyncRATUSAS62633HostRush
216.126.224.83AsyncRATUSAS14956RouterHosting
37.72.172.58Fennec RATUSAS29802Hivelocity LLC
38.255.58.201AsyncRATGBAS931Hyonix
211.197.94.135AsyncRATKRAS4766Korea Telecom
3.234.97.76AsyncRATUSAS14618Amazon AWS
23.95.106.22AsyncRATUSAS36352HostPapa
64.89.163.73AsyncRATDEAS401626Meowcore Softworks
45.84.198.55AsyncRATDEAS49581Mo's Operations GmbH
51.89.110.168AsyncRATDEAS16276OVH
213.152.161.48AsyncRATNLAS49453AirVPN
67.210.97.27AsyncRATUSAS398256Internet Utilities NA
66.165.255.14Fennec RATUSAS29802Hivelocity
50.114.206.110AsyncRATUSAS62564Ace Data Centers
83.243.122.167AsyncRATATAS57169EDIS Infrastructure
85.209.120.47AsyncRATTRAS205463VDS GLOBAL
67.211.213.203AsyncRATUSAS19318Interserver
74.81.49.18AsyncRATUSAS22439Perfect International
62.182.80.175AsyncRATUAAS30860Virtual Systems LLC
84.200.73.102AsyncRATDEAS214036UltaHost
85.17.54.227AsyncRATNLAS60781InnoSys ICT
91.92.241.103AsyncRATNLAS202412OMEGATECH
75.69.164.4AsyncRATUSAS7922Comcast Cable
91.92.241.142AsyncRATNLAS202412OMEGATECH
217.216.32.194AsyncRATSGAS141995Contabo GmbH
94.154.35.73AsyncRATNLAS202412
45.9.156.30AsyncRATBGAS211619MAXKO
91.231.222.220AsyncRATSIAS36680Kavoshgar Rayaneh Mozhan