SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 164aaedfdf707433c8a50f1e555a22f7ee2f77e5.
Database Entry
SHA1 Fingerprint: | 164aaedfdf707433c8a50f1e555a22f7ee2f77e5 |
---|---|
Certificate Common Name (CN): | 49.13.149.204 |
Issuer Distinguished Name (DN): | 49.13.149.204 |
TLS Version: | TLS 1.2 |
First seen: | 2024-04-13 11:08:36 UTC |
Last seen: | 2024-04-14 02:58:30 UTC |
Status: | Blacklisted |
Listing reason: | Vidar C&C |
Listing date: | 2024-04-15 05:26:44 |
Malware samples: | 2 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2024-04-14 02:58:30 | ec77667bbaa89f7a34954eb93ab214f3 | 23 / 72 (31.94%) | Vidar | 49.13.149.204:9000 |
2024-04-13 11:08:36 | 7739c45a190787729f3b71eed0940916 | 52 / 72 (72.22%) | 49.13.149.204:9000 |
# of entries: 2 (max: 100)