SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 310c4b4c8b6468ced82f0a21ef4e325784e73e7b.
Database Entry
SHA1 Fingerprint: | 310c4b4c8b6468ced82f0a21ef4e325784e73e7b |
---|---|
Certificate Common Name (CN): | grantmangy.top |
Issuer Distinguished Name (DN): | WE1 |
TLS Version: | TLS 1.2 |
First seen: | 2025-05-18 23:48:49 UTC |
Last seen: | 2025-05-19 11:25:36 UTC |
Status: | Blacklisted |
Listing reason: | ACRStealer C&C |
Listing date: | 2025-05-20 08:12:56 |
Malware samples: | 5 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2025-05-19 11:25:36 | 20a367fe7f4f1015f60a84701b705b12 | n/a | 172.67.221.174:443 | |
2025-05-19 09:44:44 | 7dd7e0ebc5b87d689376da2a994302f4 | n/a | 172.67.221.174:443 | |
2025-05-19 07:59:05 | 262eb122dbae0c4bd212ccebfd88561f | n/a | 172.67.221.174:443 | |
2025-05-19 07:13:49 | 98afe1ffa6ce482586c0df9f8eb80129 | n/a | 172.67.221.174:443 | |
2025-05-18 23:48:49 | 8ce658634baffd1d4214750519a3764f | n/a | 172.67.221.174:443 |
# of entries: 5 (max: 100)