SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0b6477993a1b5c5cb194ed72185d052d61206dc5.
Database Entry
SHA1 Fingerprint: | 0b6477993a1b5c5cb194ed72185d052d61206dc5 |
---|---|
Certificate Common Name (CN): | Sjsz6qQata.net |
Issuer Distinguished Name (DN): | Sjsz6qQata.net |
TLS Version: | TLS 1.2 |
First seen: | 2020-03-08 14:13:02 UTC |
Last seen: | 2020-03-10 22:11:03 UTC |
Status: | Blacklisted |
Listing reason: | IcedID C&C |
Listing date: | 2020-03-08 14:27:27 |
Malware samples: | 3 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2020-03-10 22:11:03 | 18f61cb81c780c71827e76a6d063a098 | 33 / 73 (45.21%) | IcedID | 128.199.57.93:443 |
2020-03-10 22:11:03 | 18f61cb81c780c71827e76a6d063a098 | 33 / 73 (45.21%) | IcedID | 128.199.57.93:443 |
2020-03-09 09:52:59 | ce24f38da40274383ce5dcf607be9a46 | 40 / 72 (55.56%) | ArkeiStealer | 128.199.57.93:443 |
2020-03-09 09:52:59 | ce24f38da40274383ce5dcf607be9a46 | 40 / 72 (55.56%) | ArkeiStealer | 128.199.57.93:443 |
2020-03-08 14:13:02 | 9945ed11136c673329a79120d65bc43d | 34 / 72 (47.22%) | IcedID | 128.199.57.93:443 |
2020-03-08 14:13:02 | 9945ed11136c673329a79120d65bc43d | 34 / 72 (47.22%) | IcedID | 128.199.57.93:443 |
# of entries: 6 (max: 100)