SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 4aea815804d89286875eb0547008674bbacfdbca.
Database Entry
SHA1 Fingerprint: | 4aea815804d89286875eb0547008674bbacfdbca |
---|---|
Certificate Common Name (CN): | bastarka.top |
Issuer Distinguished Name (DN): | R3 |
TLS Version: | TLS 1.2 |
First seen: | 2023-05-18 14:51:19 UTC |
Last seen: | 2023-05-18 14:52:39 UTC |
Status: | Blacklisted |
Listing reason: | Gozi C&C |
Listing date: | 2023-05-19 05:28:02 |
Malware samples: | 2 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2023-05-18 14:52:39 | 0a1878191571315e6f53ff8b82d34233 | n/a | 80.66.79.104:443 | |
2023-05-18 14:51:19 | 7fc18c44f481a5941e2d068a2cdebe0e | n/a | Gozi | 80.66.79.104:443 |
# of entries: 2 (max: 100)