SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint f799e48221b5cdb6fbcaa46f1921a45fd0c15b84.

Database Entry


SHA1 Fingerprint:f799e48221b5cdb6fbcaa46f1921a45fd0c15b84
Certificate Common Name (CN):cutheayp.ke
Issuer Distinguished Name (DN):cutheayp.ke
TLS Version:TLSv1
First seen:2015-11-08 11:51:01 UTC
Last seen:2016-01-10 23:06:46 UTC
Status:Blacklisted
Listing reason:Dridex C&C
Listing date:2015-11-08 13:27:09
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2016-01-10 23:06:46a5c52bd47f7fdfd54a2584a669eabe59Virustotal results 13/55 (23.64%) Dridex 221.132.35.56:8843
2016-01-10 23:06:46a5c52bd47f7fdfd54a2584a669eabe59Virustotal results 13/55 (23.64%) Dridex 221.132.35.56:8843
2015-11-08 11:51:01d99b6f9d9d755cfcbe4847aedadab6a8Virustotal results 17/54 (31.48%) Dridex 221.132.35.56:8843
2015-11-08 11:51:01d99b6f9d9d755cfcbe4847aedadab6a8Virustotal results 17/54 (31.48%) Dridex 221.132.35.56:8843

# of entries: 4 (max: 100)