SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 5663db41375a79c1b64f6fe7029dbf39da868276.
Database Entry
SHA1 Fingerprint: | 5663db41375a79c1b64f6fe7029dbf39da868276 |
---|---|
Certificate Common Name (CN): | monkeyactor.icu |
Issuer Distinguished Name (DN): | WE1 |
TLS Version: | TLS 1.2 |
First seen: | 2025-05-05 20:44:25 UTC |
Last seen: | 2025-05-06 04:34:53 UTC |
Status: | Blacklisted |
Listing reason: | OffLoader C&C |
Listing date: | 2025-05-06 06:07:42 |
Malware samples: | 4 |
Botnet C&Cs: | 2 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2025-05-06 04:34:53 | ea0f7e5684266c6015f736e2e74fe32d | n/a | 104.21.48.96:443 | |
2025-05-06 03:44:59 | e10e55e116d485a3daeb0ba2fcb8bec3 | n/a | 172.67.183.192:443 | |
2025-05-05 23:10:17 | afc0542ef9b31ac06ab6ea08d7f2e6f0 | n/a | 172.67.183.192:443 | |
2025-05-05 20:44:25 | 0b0d18e21b71f84dc0303cd705ecec78 | n/a | 172.67.183.192:443 |
# of entries: 4 (max: 100)