SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 3efa842c761c8dda5f3483a2b9e347852bc7a017.

Database Entry

SHA1 Fingerprint:3efa842c761c8dda5f3483a2b9e347852bc7a017
Certificate Common Name (CN)
Issuer Distinguished Name (DN):R3
TLS Version:TLS 1.2
First seen:2021-04-17 11:07:58 UTC
Last seen:2021-04-17 11:11:02 UTC
Listing reason:RaccoonStealer C&C
Listing date:2021-04-18 05:57:05
Malware samples:2
Botnet C&Cs:1

Malware Samples

The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-04-17 11:11:02a203d8c47d11dbd4386d7bba552949b0n/aRaccoonStealer5.181.156.126:443
2021-04-17 11:07:58d0269a9d4b5f083fc263eef1210dfd59Virustotal results 21 / 67 (31.34%) RaccoonStealer5.181.156.126:443

# of entries: 2 (max: 100)