SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 280b3e6601dbe99a96de45f1b6f4eba047694894.

Database Entry


SHA1 Fingerprint:280b3e6601dbe99a96de45f1b6f4eba047694894
Certificate Common Name (CN):daggioc.run
Issuer Distinguished Name (DN):WE1
TLS Version:TLS 1.2
First seen:2025-05-28 07:29:25 UTC
Last seen:2025-05-30 07:05:35 UTC
Status:Blacklisted
Listing reason:LummaStealer C&C
Listing date:2025-05-30 07:38:03
Malware samples:3
Botnet C&Cs:3

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2025-05-30 07:05:35a6e9b8f792708a075abaae7f49488606n/a104.21.32.1:443
2025-05-29 18:18:5808e6f2b8e326dcc101be51587190f5fbn/a104.21.64.1:443
2025-05-28 07:29:251c7117594d6fc1cda9d204e00adf359en/a104.21.48.1:443

# of entries: 3 (max: 100)