SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint a97b7616d3cfe7fec84f270d15cdd149d30ecdc6.

Database Entry


SHA1 Fingerprint:a97b7616d3cfe7fec84f270d15cdd149d30ecdc6
Certificate Common Name (CN):sosqureles.taionesheso.bm
Issuer Distinguished Name (DN):sosqureles.taionesheso.bm
TLS Version:TLS 1.2
First seen:2017-01-23 19:56:06 UTC
Last seen:2017-02-11 18:48:51 UTC
Status:Blacklisted
Listing reason:Dridex C&C
Listing date:2017-01-24 05:52:05
Malware samples:3
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2017-02-11 18:48:51449e01dd19123ae8b0832715040d573bVirustotal results 9/55 (16.36%) Dridex 31.31.168.26:443
2017-02-11 18:48:51449e01dd19123ae8b0832715040d573bVirustotal results 9/55 (16.36%) Dridex 31.31.168.26:443
2017-02-07 16:38:48315044424d854d012f4bac9d3ab2b416Virustotal results 7/56 (12.50%) Dridex 80.90.203.245:443
2017-02-07 16:38:48315044424d854d012f4bac9d3ab2b416Virustotal results 7/56 (12.50%) Dridex 80.90.203.245:443
2017-01-23 19:56:0655c2368aa15a128e946fafd700160375Virustotal results 7/56 (12.50%) Dridex 31.31.168.26:443
2017-01-23 19:56:0655c2368aa15a128e946fafd700160375Virustotal results 7/56 (12.50%) Dridex 31.31.168.26:443

# of entries: 6 (max: 100)