SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0aafe06c86f4d202804785053719f7595da514b9.
Database Entry
SHA1 Fingerprint: | 0aafe06c86f4d202804785053719f7595da514b9 |
---|---|
Certificate Common Name (CN): | jasper/L=Some-city/O=jasper/ST=Some-state/OU=unit |
Issuer Distinguished Name (DN): | root |
TLS Version: | TLS 1.2 |
First seen: | 2018-04-01 11:23:54 UTC |
Last seen: | 2018-04-07 18:26:34 UTC |
Status: | Blacklisted |
Listing reason: | Corebot C&C |
Listing date: | 2018-04-07 15:07:23 |
Malware samples: | 4 |
Botnet C&Cs: | 2 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2018-04-07 18:26:34 | e09c0ae2ea8fa601bba8683adf55b1ab | 35/66 (53.03%) | Adware.Techsnab | 199.247.31.200:443 |
2018-04-07 18:26:34 | e09c0ae2ea8fa601bba8683adf55b1ab | 35/66 (53.03%) | Adware.Techsnab | 199.247.31.200:443 |
2018-04-06 06:29:10 | 6c0dad9926767502a2bc2029bbd95d63 | 50/67 (74.63%) | Corebot | 178.209.40.104:443 |
2018-04-06 06:29:10 | 6c0dad9926767502a2bc2029bbd95d63 | 50/67 (74.63%) | Corebot | 178.209.40.104:443 |
2018-04-02 11:51:31 | f88692c7a2e556bcdba7c2f3986f8009 | 40/68 (58.82%) | Corebot | 199.247.31.200:443 |
2018-04-02 11:51:31 | f88692c7a2e556bcdba7c2f3986f8009 | 40/68 (58.82%) | Corebot | 199.247.31.200:443 |
2018-04-01 11:23:54 | e4f2f0af8924ccb7f16938cb570adb4f | 41/67 (61.19%) | Corebot | 178.209.40.104:443 |
2018-04-01 11:23:54 | e4f2f0af8924ccb7f16938cb570adb4f | 41/67 (61.19%) | Corebot | 178.209.40.104:443 |
# of entries: 8 (max: 100)