RFC 6066 doesn't specify or even recommend any particular HTTP error in the case that the hostname sent via SNI (Server Name Indication) doesn't match the HTTP Host header.
It does recommend that the server abort the TLS handshake if the SNI hostname is not one that it provides service for. From section 3:
Since such a malformed request can get past the TLS handshake and need to be rejected in HTTP, an HTTP response code is necessary. Of all those that exist, only one really fits the situation:
This is, in fact, the response that RFC 7230 specifies. From section 5.4 describing the Host header:
I'm going to recommend strongly against using 502 for this. Its semantics indicate that something is wrong on the server side and that the request would succeed if tried later.