SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 30d37339d06b71d7e10f36579acb63cbb896ca13.

Database Entry


SHA1 Fingerprint:30d37339d06b71d7e10f36579acb63cbb896ca13
Certificate Common Name (CN):mrodularmall.top
Issuer Distinguished Name (DN):WE1
TLS Version:TLS 1.2
First seen:2025-03-13 13:45:39 UTC
Last seen:2025-03-14 02:29:44 UTC
Status:Blacklisted
Listing reason:LummaStealer C&C
Listing date:2025-03-15 07:47:40
Malware samples:3
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2025-03-14 02:29:442b234aa38f6f012a8ae20074520daa5cn/a104.21.48.1:443
2025-03-13 13:47:030baef79b1d953aeb7f7d1057f7f67478n/a104.21.64.1:443
2025-03-13 13:45:39a381c8fda83e98d25b7bc0dc8d2f6113n/a104.21.64.1:443

# of entries: 3 (max: 100)