SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0b43b1f17fc3b48ef07abddf6c61fe1605d93121.

Database Entry


SHA1 Fingerprint:0b43b1f17fc3b48ef07abddf6c61fe1605d93121
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:TLS 1.2
First seen:2019-12-02 04:50:26 UTC
Last seen:2019-12-03 16:25:24 UTC
Status:Blacklisted
Listing reason:FindPOS C&C
Listing date:2019-12-02 08:23:21
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2019-12-03 16:25:2441e5d2443df833c9138a9ae7b4bdc860n/aFindPOS91.224.22.60:443
2019-12-02 14:01:595dc3d0b89cafc86cabe06db45ed72704n/aFindPOS91.224.22.60:443
2019-12-02 04:50:267722654a0beb746f791de2533e0efb4an/aFindPOS91.224.22.60:443

# of entries: 3 (max: 100)