SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 30ad5fd5180d8e808f8a5c763af29dc8e0757762.

Database Entry


SHA1 Fingerprint:30ad5fd5180d8e808f8a5c763af29dc8e0757762
Certificate Common Name (CN):roadsimilar.app
Issuer Distinguished Name (DN):roadsimilar.app
TLS Version:TLS 1.2
First seen:2025-06-02 17:47:54 UTC
Last seen:2025-06-06 13:59:20 UTC
Status:Blacklisted
Listing reason:Rhadamanthys C&C
Listing date:2025-06-07 09:25:49
Malware samples:5
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2025-06-06 13:59:20ef4154299a9fc3430aa78983c49f9f9dn/a45.153.34.237:443
2025-06-04 17:33:22077e866054d4fae6d0ba91235b72d942n/a45.153.34.237:443
2025-06-03 17:18:124f7274abb2ce9c43eebb78257f6033ban/a45.153.34.237:443
2025-06-03 12:38:479a69d8ad125a0f50f38cb4b42c11e906n/a45.153.34.237:443
2025-06-02 17:47:5466e55f659a9082440606ae2ab1213729n/a45.153.34.237:443

# of entries: 5 (max: 100)