SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 4ed8a8b1f88a9b6d820bc8e9d17a5b074e0e5ee5.

Database Entry


SHA1 Fingerprint:4ed8a8b1f88a9b6d820bc8e9d17a5b074e0e5ee5
Certificate Common Name (CN):raterake.cfd
Issuer Distinguished Name (DN):WE1
TLS Version:TLS 1.2
First seen:2026-04-10 11:04:27 UTC
Last seen:never
Status:Blacklisted
Listing reason:OffLoader C&C
Listing date:2026-04-12 06:46:17
Malware samples:1
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2026-04-10 11:04:27d4e0c66f60ffee80d3e931933723d2ccn/a188.114.96.0:443

# of entries: 1 (max: 100)