SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 169fcafd6f04e3f0179483e10281bcfbbbedf773.

Database Entry


SHA1 Fingerprint:169fcafd6f04e3f0179483e10281bcfbbbedf773
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:SSLv3
First seen:2015-04-27 01:06:41 UTC
Last seen:2018-04-08 14:59:35 UTC
Status:Blacklisted
Listing reason:TorrentLocker C&C
Listing date:2015-09-11 07:08:47
Malware samples:8
Botnet C&Cs:6

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2018-04-08 14:59:35b9ee28b6cb981a736531a689b085aa64Virustotal results 38/68 (55.88%) FindPOS185.164.34.18:443
2017-12-04 16:04:48add07f8724b0685b2b6e18d10b315779Virustotal results 38/68 (55.88%) FindPOS185.164.34.18:443
2017-11-08 08:05:25c392972abfe187e47bf22d70b7d5ff3aVirustotal results 45/67 (67.16%) TrickBot 185.164.34.16:443
2017-11-08 08:05:25c392972abfe187e47bf22d70b7d5ff3aVirustotal results 45/67 (67.16%) TrickBot 185.164.34.16:443
2016-10-27 09:18:0367d7df129325c7c836ab752a08d08a80Virustotal results 20/57 (35.09%) FindPOS193.28.179.153:443
2016-03-23 23:20:48c8d99e4e9b43ee28384b4f7c6c862550Virustotal results 38/57 (66.67%) 193.28.179.151:443
2015-12-23 07:22:11133e5b7898814c3593b04513d479d2cfVirustotal results 2/54 (3.70%) Vawtrak 193.28.179.149:443
2015-09-10 10:09:2684928f0dbf61be64c0ea8a5fcff54e38Virustotal results 12/57 (21.05%) FindPOS89.144.2.148:443
2015-04-27 01:06:415b160c024e10ab184288c6aa7eaf0ad0Virustotal results 23/57 (40.35%) FindPOS89.144.2.148:443

# of entries: 9 (max: 100)