SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0b43b1f17fc3b48ef07abddf6c61fe1605d93121.

Database Entry


SHA1 Fingerprint:0b43b1f17fc3b48ef07abddf6c61fe1605d93121
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:TLS 1.2
First seen:2019-12-02 04:50:26 UTC
Last seen:2020-06-08 02:26:49 UTC
Status:Blacklisted
Listing reason:FindPOS C&C
Listing date:2019-12-02 08:23:21
Malware samples:5
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-06-08 02:26:4915446d90bb1253c912eaf89e39b4f190Virustotal results 14 / 72 (19.44%) FindPOS91.224.22.60:443
2020-03-25 21:47:433c107eb4e2443f4935b2973b4eaec1d7Virustotal results 13 / 73 (17.81%) FindPOS91.224.22.60:443
2019-12-03 16:25:2441e5d2443df833c9138a9ae7b4bdc860n/aFindPOS91.224.22.60:443
2019-12-02 14:01:595dc3d0b89cafc86cabe06db45ed72704n/aFindPOS91.224.22.60:443
2019-12-02 04:50:267722654a0beb746f791de2533e0efb4an/aFindPOS91.224.22.60:443

# of entries: 5 (max: 100)