SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 76f47d399ea1b628a9587a2f6d412872304d40bd.

Database Entry


SHA1 Fingerprint:76f47d399ea1b628a9587a2f6d412872304d40bd
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:TLS 1.2
First seen:2015-09-10 10:09:26 UTC
Last seen:2016-10-27 09:18:03 UTC
Status:Blacklisted
Listing reason:TorrentLocker C&C
Listing date:2015-09-11 07:08:48
Malware samples:3
Botnet C&Cs:3

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2016-10-27 09:18:0367d7df129325c7c836ab752a08d08a80Virustotal results 20/57 (35.09%) FindPOS46.161.40.101:443
2016-10-27 09:18:0367d7df129325c7c836ab752a08d08a80Virustotal results 20/57 (35.09%) FindPOS46.161.40.101:443
2015-12-23 07:22:11133e5b7898814c3593b04513d479d2cfVirustotal results 2/54 (3.70%) Vawtrak 46.161.40.105:443
2015-12-23 07:22:11133e5b7898814c3593b04513d479d2cfVirustotal results 2/54 (3.70%) Vawtrak 46.161.40.105:443
2015-09-10 10:09:2684928f0dbf61be64c0ea8a5fcff54e38Virustotal results 12/57 (21.05%) FindPOS46.161.40.109:443
2015-09-10 10:09:2684928f0dbf61be64c0ea8a5fcff54e38Virustotal results 12/57 (21.05%) FindPOS46.161.40.109:443

# of entries: 6 (max: 100)