SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 546d66a723cf6c4586cf0413f169597c3586394f.
Database Entry
SHA1 Fingerprint: | 546d66a723cf6c4586cf0413f169597c3586394f |
---|---|
Certificate Common Name (CN): | dylan/L=Some-city/O=dylan/ST=Some-state/OU=unit |
Issuer Distinguished Name (DN): | root |
TLS Version: | TLS 1.2 |
First seen: | 2018-03-15 10:07:32 UTC |
Last seen: | 2018-03-15 10:07:34 UTC |
Status: | Blacklisted |
Listing reason: | Corebot C&C |
Listing date: | 2018-03-19 10:24:59 |
Malware samples: | 1 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2018-03-15 10:07:34 | 502d1a8c741e4680f6dbca0266d079a3 | 7/67 (10.45%) | Corebot | 94.177.12.145:443 |
2018-03-15 10:07:34 | 502d1a8c741e4680f6dbca0266d079a3 | 7/67 (10.45%) | Corebot | 94.177.12.145:443 |
# of entries: 2 (max: 100)