SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 39a412479325729f5f660e85a27f359a99c5b84c.

Database Entry


SHA1 Fingerprint:39a412479325729f5f660e85a27f359a99c5b84c
Certificate Common Name (CN):autopartslarry.top
Issuer Distinguished Name (DN):R3
TLS Version:TLS 1.2
First seen:2021-03-10 19:57:21 UTC
Last seen:2021-03-10 22:13:43 UTC
Status:Blacklisted
Listing reason:RaccoonStealer C&C
Listing date:2021-03-11 07:10:00
Malware samples:6
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-03-10 22:13:4367e72f0aba5d4df92087cfc2e6c71031Virustotal results 30 / 68 (44.12%) RaccoonStealer34.90.118.146:443
2021-03-10 21:25:124f66694bd09060fa11e6b24ef7180c6bVirustotal results 32 / 67 (47.76%) RaccoonStealer34.90.118.146:443
2021-03-10 21:24:165c38277446ab3a5e495cf450e6891202Virustotal results 41 / 71 (57.75%) RaccoonStealer34.90.118.146:443
2021-03-10 20:32:12aad5f4d13740846687680eaa134b1a1en/aRaccoonStealer34.90.118.146:443
2021-03-10 20:25:031088de3574b6fa2ba2b57086f7876ae5n/aRaccoonStealer34.90.118.146:443
2021-03-10 19:57:2119f66fe1f37df900595efc4a21bfbdacVirustotal results 17 / 70 (24.29%) RaccoonStealer34.90.118.146:443

# of entries: 6 (max: 100)