SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 4fb4c81ef5c1bf0e2e533d8c46634067a15f25fe.

Database Entry


SHA1 Fingerprint:4fb4c81ef5c1bf0e2e533d8c46634067a15f25fe
Certificate Common Name (CN):ckytiqfles.com/emailAddress=info@ckytiqfles.com
Issuer Distinguished Name (DN):ckytiqfles.com/emailAddress=info@ckytiqfles.com
TLS Version:SSLv3
First seen:2014-06-15 07:07:19 UTC
Last seen:2014-06-15 07:10:22 UTC
Status:Blacklisted
Listing reason:KINS C&C
Listing date:2014-06-15 08:05:20
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2014-06-15 07:10:22248f17d11ecb1ceaf541511ffa16b88aVirustotal results 15/53 (28.30%) ZeuS 185.14.28.135:443
2014-06-15 07:10:22248f17d11ecb1ceaf541511ffa16b88aVirustotal results 15/53 (28.30%) ZeuS 185.14.28.135:443
2014-06-15 07:07:20c7a562e36f7eae16a1d59ee9e9cea840Virustotal results 3/53 (5.66%) ZeuS 185.14.28.135:443
2014-06-15 07:07:20c7a562e36f7eae16a1d59ee9e9cea840Virustotal results 3/53 (5.66%) ZeuS 185.14.28.135:443

# of entries: 4 (max: 100)