SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 4112fd7e6a5f6d4990ef99d310c1e2031523be38.

Database Entry


SHA1 Fingerprint:4112fd7e6a5f6d4990ef99d310c1e2031523be38
Certificate Common Name (CN):Orcus Server
Issuer Distinguished Name (DN):Orcus Server
TLS Version:TLSv1
First seen:2018-12-02 00:14:24 UTC
Last seen:2019-03-12 01:35:54 UTC
Status:Blacklisted
Listing reason:OrcusRAT C&C
Listing date:2018-12-02 14:31:07
Malware samples:6
Botnet C&Cs:4

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2019-03-12 01:35:54140b7bfc1d82899ba452e171bc635344Virustotal results 27/62 (43.55%) OrcusRAT 13.53.94.89:25565
2019-03-10 17:22:365da690292e7b8d785691bf2d182ba58fn/aOrcusRAT 13.53.94.89:25565
2019-02-26 11:48:18d434acd2238c290a4ef72e19277ddf44Virustotal results 26/70 (37.14%) OrcusRAT 3.121.182.157:1604
2019-02-26 09:52:534f2607faec3cb30dc8c476c7029f9046Virustotal results 21/66 (31.82%) Spambot.Kelihos3.121.182.157:1604
2018-12-20 10:18:379b7198c4c83728544165932dfb266f32Virustotal results 6/70 (8.57%) LimeRAT160.20.147.219:1000
2018-12-02 00:14:24b1648ae29325ae12cf60e5587f50202dVirustotal results 48/70 (68.57%) OrcusRAT 109.234.36.198:1616

# of entries: 6 (max: 100)