SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0dea646cb33fb285b12da4341c5f8b4cf45a51fd.

Database Entry


SHA1 Fingerprint:0dea646cb33fb285b12da4341c5f8b4cf45a51fd
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:TLS 1.2
First seen:2017-10-27 11:21:57 UTC
Last seen:2017-10-30 07:25:35 UTC
Status:Blacklisted
Listing reason:PandaZeuS C&C
Listing date:2017-11-01 12:34:18
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2017-10-30 07:25:35986c38ccc8cfcc35da4b9fb86d7c18d2Virustotal results 35/68 (51.47%) 164.132.28.118:443
2017-10-30 07:25:35986c38ccc8cfcc35da4b9fb86d7c18d2Virustotal results 35/68 (51.47%) 164.132.28.118:443
2017-10-27 11:21:581621f341e058349973f8d71a3242dd9aVirustotal results 16/59 (27.12%) Hancitor164.132.28.118:443
2017-10-27 11:21:581621f341e058349973f8d71a3242dd9aVirustotal results 16/59 (27.12%) Hancitor164.132.28.118:443

# of entries: 4 (max: 100)