SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0edd722452c12c686f16a7ee7be74b56e89a6db5.

Database Entry


SHA1 Fingerprint:0edd722452c12c686f16a7ee7be74b56e89a6db5
Certificate Common Name (CN):kpai7ycr7jxqkilp.torexplorer.com
Issuer Distinguished Name (DN):RapidSSL CA
TLS Version:SSLv3
First seen:2014-06-11 20:06:52 UTC
Last seen:2014-06-14 10:08:08 UTC
Status:Blacklisted
Listing reason:CryptoWall C&C
Listing date:2014-06-14 08:19:50
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2014-06-14 10:08:08e541dfa369bb19814c0024122ba64fd0Virustotal results 37/54 (68.52%) 37.200.65.119:443
2014-06-14 10:08:08e541dfa369bb19814c0024122ba64fd0Virustotal results 37/54 (68.52%) 37.200.65.119:443
2014-06-11 20:06:5286b6ee398f4494dce7adc7124b7ef966Virustotal results 27/51 (52.94%) CryptoWall37.200.65.119:443
2014-06-11 20:06:5286b6ee398f4494dce7adc7124b7ef966Virustotal results 27/51 (52.94%) CryptoWall37.200.65.119:443

# of entries: 4 (max: 100)