SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 5f69c698b2377d63494c3db9f9c4a261964dc4a1.

Database Entry


SHA1 Fingerprint:5f69c698b2377d63494c3db9f9c4a261964dc4a1
Certificate Common Name (CN):localhost
Issuer Distinguished Name (DN):localhost
TLS Version:SSLv3
First seen:2014-12-20 09:36:10 UTC
Last seen:2014-12-27 01:29:41 UTC
Status:Blacklisted
Listing reason:KINS C&C
Listing date:2014-12-20 15:04:39
Malware samples:5
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2014-12-27 01:29:415a71b8ec02a94351c35ac4252739e5e0Virustotal results 2/55 (3.64%) ZeuS 185.63.253.139:443
2014-12-24 11:34:2083d63f81b44ec1a43b7e711833883af8Virustotal results 16/56 (28.57%) ZeuS 185.63.253.139:443
2014-12-23 11:35:13d2c536e7d7ff8bb02b91f26a15f884ddVirustotal results 9/56 (16.07%) ZeuS 185.63.253.139:443
2014-12-20 10:51:179a85d75c8fc248c7ab45b2d8e6709d32Virustotal results 2/54 (3.70%) ZeuS 185.63.253.139:443
2014-12-20 09:36:10eed4518d139cd89ac436000f605db326Virustotal results 7/55 (12.73%) ZeuS 185.63.253.139:443

# of entries: 5 (max: 100)