SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 5381adcf3c17b7f862281a5a08920692e50c45f4.

Database Entry


SHA1 Fingerprint:5381adcf3c17b7f862281a5a08920692e50c45f4
Certificate Common Name (CN):Ssms5tlew.3abukserkw.nexus
Issuer Distinguished Name (DN):Ssms5tlew.3abukserkw.nexus
TLS Version:TLS 1.2
First seen:2016-12-02 15:37:05 UTC
Last seen:2016-12-11 02:52:17 UTC
Status:Blacklisted
Listing reason:Dridex C&C
Listing date:2016-12-03 09:35:03
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2016-12-11 02:52:1763cb9c5b9ef45c5cb72d657d56bb5827Virustotal results 12/56 (21.43%) Dridex 166.78.144.68:8343
2016-12-03 15:16:003286fece31287965b38b391a4424f73eVirustotal results 25/57 (43.86%) Dridex 166.78.144.68:8343
2016-12-02 15:37:05561a98906127a080c4e036524cdfa298Virustotal results 14/56 (25.00%) Dridex 166.78.144.68:8343

# of entries: 3 (max: 100)