SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 0eda9c1bf5f4ac1f5bd44eb93d8e7bf0acf3a691.

Database Entry


SHA1 Fingerprint:0eda9c1bf5f4ac1f5bd44eb93d8e7bf0acf3a691
Certificate Common Name (CN):pisppsthmhe.sa
Issuer Distinguished Name (DN):pisppsthmhe.sa
TLS Version:TLS 1.2
First seen:2015-08-05 16:56:09 UTC
Last seen:2015-08-10 07:18:00 UTC
Status:Blacklisted
Listing reason:Dridex C&C
Listing date:2015-08-06 04:55:05
Malware samples:6
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2015-08-10 07:18:00393e2145f4c3e9b5697a2aaeb25aa8d3Virustotal results 1/56 (1.79%) Dridex 94.23.110.45:443
2015-08-07 10:28:30ac64211574eb18f40646bcd739fce6c6Virustotal results 0/55 (0.00%) Dridex 94.23.110.45:443
2015-08-07 07:01:28f4b4658b68b37bcc7c8a478dd8d7d867Virustotal results 3/55 (5.45%) Dridex 94.23.110.45:443
2015-08-07 01:57:3600dca835bb93708797a053a3b540db16Virustotal results 0/49 (0.00%) Dridex 94.23.110.45:443
2015-08-06 02:01:276ea9c3865cf1a2be4b74fb2d94af85feVirustotal results 1/55 (1.82%) Dridex 94.23.110.45:443
2015-08-05 16:56:092ca3d7c9f95cbb42efa447d1cbe9a885Virustotal results 14/56 (25.00%) Downloader.Pony94.23.110.45:443

# of entries: 6 (max: 100)