SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 4544f891cb3c190366bc5d0d331ae17e254b26e6.

Database Entry


SHA1 Fingerprint:4544f891cb3c190366bc5d0d331ae17e254b26e6
Certificate Common Name (CN):tasksheduler.network
Issuer Distinguished Name (DN):Sectigo RSA Domain Validation Secure Server CA
TLS Version:TLS 1.2
First seen:2019-12-23 07:20:06 UTC
Last seen:2019-12-26 20:54:02 UTC
Status:Blacklisted
Listing reason:Malware C&C
Listing date:2019-12-26 09:58:26
Malware samples:4
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2019-12-26 20:54:02a75c20d206a5fa3e7c714d3bc332417aVirustotal results 20 / 72 (27.78%) RaccoonStealer198.54.125.162:443
2019-12-26 00:08:540b42fe61454c4e9f9d71055300345f3dVirustotal results 43 / 71 (60.56%) RaccoonStealer198.54.125.162:443
2019-12-24 08:34:45b169915d5093069ed44c56267f14f694Virustotal results 18 / 72 (25.00%) Adware.ExtenBro198.54.125.162:443
2019-12-23 07:20:06f2bd1b6777fa526abf1de08b76952918Virustotal results 20 / 72 (27.78%) Adware.ExtenBro198.54.125.162:443

# of entries: 4 (max: 100)