SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 9cc93e0add5efdf43bc566836e5666d7049701ed.

Database Entry


SHA1 Fingerprint:9cc93e0add5efdf43bc566836e5666d7049701ed
Certificate Common Name (CN):presidentjunction.org/emailAddress=admin@presidentjunction.org
Issuer Distinguished Name (DN):presidentjunction.org/emailAddress=admin@presidentjunction.org
TLS Version:TLS 1.2
First seen:2015-08-14 09:28:55 UTC
Last seen:2015-08-18 09:06:41 UTC
Status:Blacklisted
Listing reason:Gozi C&C
Listing date:2015-08-14 09:35:54
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2015-08-18 09:06:416977acfd7a41de82c890247062f7f8c3Virustotal results 36/56 (64.29%) Gozi 217.23.7.121:443
2015-08-18 09:06:416977acfd7a41de82c890247062f7f8c3Virustotal results 36/56 (64.29%) Gozi 217.23.7.121:443
2015-08-14 09:28:55df968dfad38c0b28345d5e3b177a5392Virustotal results 2/57 (3.51%) Gozi 217.23.7.121:443
2015-08-14 09:28:55df968dfad38c0b28345d5e3b177a5392Virustotal results 2/57 (3.51%) Gozi 217.23.7.121:443

# of entries: 4 (max: 100)