SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0e66f3d415a6e83a25ce595e409a8c8be4e87af8.
Database Entry
SHA1 Fingerprint: | 0e66f3d415a6e83a25ce595e409a8c8be4e87af8 |
---|---|
Certificate Common Name (CN): | C=XX, L=Default City, O=Default Company Ltd |
Issuer Distinguished Name (DN): | C=XX, L=Default City, O=Default Company Ltd |
TLS Version: | TLS 1.2 |
First seen: | 2015-09-13 05:44:36 UTC |
Last seen: | 2016-03-18 17:11:23 UTC |
Status: | Blacklisted |
Listing reason: | FindPOS C&C |
Listing date: | 2015-11-14 08:38:59 |
Malware samples: | 4 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2016-03-18 17:11:23 | f3bdd42f905b04bfb7bf5a9005611268 | 10/57 (17.54%) | 93.179.69.118:443 | |
2016-03-18 17:11:23 | f3bdd42f905b04bfb7bf5a9005611268 | 10/57 (17.54%) | 93.179.69.118:443 | |
2016-02-01 09:00:15 | 9aa90f181fdf2a08ff3a13d4081f17bf | 9/54 (16.67%) | 93.179.69.118:443 | |
2016-02-01 09:00:15 | 9aa90f181fdf2a08ff3a13d4081f17bf | 9/54 (16.67%) | 93.179.69.118:443 | |
2016-01-17 02:10:38 | 9642f5d90f884f5d20f947946300b7c3 | 19/54 (35.19%) | FindPOS | 93.179.69.118:443 |
2016-01-17 02:10:38 | 9642f5d90f884f5d20f947946300b7c3 | 19/54 (35.19%) | FindPOS | 93.179.69.118:443 |
2015-09-13 05:44:36 | 6ef0c765c19914086d38eae3ab5122a3 | 5/56 (8.93%) | FindPOS | 93.179.69.118:443 |
2015-09-13 05:44:36 | 6ef0c765c19914086d38eae3ab5122a3 | 5/56 (8.93%) | FindPOS | 93.179.69.118:443 |
# of entries: 8 (max: 100)