SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint a8c77904f3e61e6d182d7a691525c409ff12ef86.

Database Entry


SHA1 Fingerprint:a8c77904f3e61e6d182d7a691525c409ff12ef86
Certificate Common Name (CN):localhost.localdomain/emailAddress=root@localhost.localdomain
Issuer Distinguished Name (DN):localhost.localdomain/emailAddress=root@localhost.localdomain
TLS Version:SSLv3
First seen:2014-05-25 14:27:36 UTC
Last seen:2014-05-27 01:07:35 UTC
Status:Blacklisted
Listing reason:KINS C&C
Listing date:2014-05-26 08:33:16
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2014-05-27 01:07:35e4234120767fd3fc670e44a05101604dVirustotal results 20/53 (37.74%) ZeuS 217.174.100.237:443
2014-05-27 01:07:35e4234120767fd3fc670e44a05101604dVirustotal results 20/53 (37.74%) ZeuS 217.174.100.237:443
2014-05-25 14:27:36790b141313b3fafaaf00aee0b342ab9aVirustotal results 24/53 (45.28%) ZeuS 217.174.100.237:443
2014-05-25 14:27:36790b141313b3fafaaf00aee0b342ab9aVirustotal results 24/53 (45.28%) ZeuS 217.174.100.237:443

# of entries: 4 (max: 100)