SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 1df8c7cc29f06b376f353591d04f94a0c23bc5e3.

Database Entry


SHA1 Fingerprint:1df8c7cc29f06b376f353591d04f94a0c23bc5e3
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:TLS 1.2
First seen:2020-03-25 21:47:43 UTC
Last seen:2020-06-08 02:26:50 UTC
Status:Blacklisted
Listing reason:FindPOS C&C
Listing date:2020-03-26 07:44:18
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-06-08 02:26:5015446d90bb1253c912eaf89e39b4f190Virustotal results 14 / 72 (19.44%) FindPOS195.69.187.142:443
2020-06-08 02:26:5015446d90bb1253c912eaf89e39b4f190Virustotal results 14 / 72 (19.44%) FindPOS195.69.187.142:443
2020-03-25 21:47:433c107eb4e2443f4935b2973b4eaec1d7Virustotal results 13 / 73 (17.81%) FindPOS195.69.187.142:443
2020-03-25 21:47:433c107eb4e2443f4935b2973b4eaec1d7Virustotal results 13 / 73 (17.81%) FindPOS195.69.187.142:443

# of entries: 4 (max: 100)