SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 4800507318a6dc985496a5463f86499096ab10f3.
Database Entry
SHA1 Fingerprint: | 4800507318a6dc985496a5463f86499096ab10f3 |
---|---|
Certificate Common Name (CN): | lanyclserr.iq |
Issuer Distinguished Name (DN): | lanyclserr.iq |
TLS Version: | TLSv1 |
First seen: | 2016-03-17 20:55:12 UTC |
Last seen: | 2016-03-28 01:11:28 UTC |
Status: | Blacklisted |
Listing reason: | Dridex C&C |
Listing date: | 2016-03-18 13:19:51 |
Malware samples: | 2 |
Botnet C&Cs: | 2 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2016-03-28 01:11:28 | c26d2cb3738a147de548d3c482f13ea4 | 17/57 (29.82%) | Dridex | 94.8.36.110:8443 |
2016-03-28 01:11:28 | c26d2cb3738a147de548d3c482f13ea4 | 17/57 (29.82%) | Dridex | 94.8.36.110:8443 |
2016-03-17 20:55:12 | df349df91be35f8b0696c206317a8019 | 4/55 (7.27%) | Dridex | 47.88.191.14:443 |
2016-03-17 20:55:12 | df349df91be35f8b0696c206317a8019 | 4/55 (7.27%) | Dridex | 47.88.191.14:443 |
# of entries: 4 (max: 100)