SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 5663db41375a79c1b64f6fe7029dbf39da868276.

Database Entry


SHA1 Fingerprint:5663db41375a79c1b64f6fe7029dbf39da868276
Certificate Common Name (CN):monkeyactor.icu
Issuer Distinguished Name (DN):WE1
TLS Version:TLS 1.2
First seen:2025-05-05 20:44:25 UTC
Last seen:2025-05-06 04:34:53 UTC
Status:Blacklisted
Listing reason:OffLoader C&C
Listing date:2025-05-06 06:07:42
Malware samples:4
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2025-05-06 04:34:53ea0f7e5684266c6015f736e2e74fe32dn/a104.21.48.96:443
2025-05-06 03:44:59e10e55e116d485a3daeb0ba2fcb8bec3n/a172.67.183.192:443
2025-05-05 23:10:17afc0542ef9b31ac06ab6ea08d7f2e6f0n/a172.67.183.192:443
2025-05-05 20:44:250b0d18e21b71f84dc0303cd705ecec78n/a172.67.183.192:443

# of entries: 4 (max: 100)