SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0aafe06c86f4d202804785053719f7595da514b9.

Database Entry


SHA1 Fingerprint:0aafe06c86f4d202804785053719f7595da514b9
Certificate Common Name (CN):jasper/L=Some-city/O=jasper/ST=Some-state/OU=unit
Issuer Distinguished Name (DN):root
TLS Version:TLS 1.2
First seen:2018-04-01 11:23:54 UTC
Last seen:2018-04-07 18:26:34 UTC
Status:Blacklisted
Listing reason:Corebot C&C
Listing date:2018-04-07 15:07:23
Malware samples:4
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2018-04-07 18:26:34e09c0ae2ea8fa601bba8683adf55b1abVirustotal results 35/66 (53.03%) Adware.Techsnab199.247.31.200:443
2018-04-06 06:29:106c0dad9926767502a2bc2029bbd95d63Virustotal results 50/67 (74.63%) Corebot 178.209.40.104:443
2018-04-02 11:51:31f88692c7a2e556bcdba7c2f3986f8009Virustotal results 40/68 (58.82%) Corebot 199.247.31.200:443
2018-04-01 11:23:54e4f2f0af8924ccb7f16938cb570adb4fVirustotal results 41/67 (61.19%) Corebot 178.209.40.104:443

# of entries: 4 (max: 100)