SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0caf29e9a5d38c497b136406d6b02552a986b88c.

Database Entry


SHA1 Fingerprint:0caf29e9a5d38c497b136406d6b02552a986b88c
Certificate Common Name (CN):tiangandincygs.kn
Issuer Distinguished Name (DN):tiangandincygs.kn
TLS Version:TLSv1
First seen:2016-02-22 14:29:12 UTC
Last seen:2016-02-26 11:20:48 UTC
Status:Blacklisted
Listing reason:Dridex C&C
Listing date:2016-02-22 14:40:27
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2016-02-26 11:20:485c787a3f00712179b89f6035385ff534Virustotal results 10/56 (17.86%) 85.25.236.32:4430
2016-02-23 13:28:294cbd7cc8bf145c8f9b8bac17f4c4d696Virustotal results 3/54 (5.56%) Dridex 85.25.236.32:4430
2016-02-22 14:29:12ab65984f0597c947fcdc127f66c10b69Virustotal results 2/55 (3.64%) Dridex 85.25.236.32:4430

# of entries: 3 (max: 100)