SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 2c5bdffc535cb08b23bcff4ecd5dd9ecb769badf.

Database Entry


SHA1 Fingerprint:2c5bdffc535cb08b23bcff4ecd5dd9ecb769badf
Certificate Common Name (CN):onthewire1.top
Issuer Distinguished Name (DN):R3
TLS Version:TLS 1.2
First seen:2021-03-24 07:51:15 UTC
Last seen:2021-03-25 09:08:10 UTC
Status:Blacklisted
Listing reason:RaccoonStealer C&C
Listing date:2021-03-24 08:42:45
Malware samples:12
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-03-25 09:08:1021720f1923b022f0e4896069fd3c0e48n/aRaccoonStealer193.135.12.12:443
2021-03-24 15:15:29894faa0a3af1e040e1a986c4ff8176faVirustotal results 45 / 70 (64.29%) RaccoonStealer193.135.12.12:443
2021-03-24 14:15:29ceb3937f5d91fcc5895895e541192258n/aRaccoonStealer193.135.12.10:443
2021-03-24 14:06:28553bd4dc29a1071edb44c7c8fd71b087Virustotal results 27 / 71 (38.03%) RaccoonStealer193.135.12.10:443
2021-03-24 13:26:152ced865586d8e9bb89a6ca7a79f491c7n/aRaccoonStealer193.135.12.12:443
2021-03-24 12:42:2102d6005de00678ab5d56d83037c43094n/aRaccoonStealer193.135.12.12:443
2021-03-24 11:26:316aed4fabddbfcf2f904b260c16c6e733n/aRaccoonStealer193.135.12.12:443
2021-03-24 11:19:22ce7dc94e4eb1d7a2073b4b32ba36b8e7Virustotal results 31 / 70 (44.29%) RaccoonStealer193.135.12.10:443
2021-03-24 10:51:376378c749dc3dd1129b239642ad7c61bdn/aRaccoonStealer193.135.12.12:443
2021-03-24 09:47:50022ff2f649f14d324600b760f5aaca06n/aRaccoonStealer193.135.12.10:443
2021-03-24 08:02:17aeb76dca50d9159b08756c56df304431n/aRaccoonStealer193.135.12.10:443
2021-03-24 07:51:1579ffd01748087228abae746bc0417867n/aRaccoonStealer193.135.12.12:443

# of entries: 12 (max: 100)