SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 6171d10623d6850c8048fef17a4e0f8d6462b3e7.

Database Entry


SHA1 Fingerprint:6171d10623d6850c8048fef17a4e0f8d6462b3e7
Certificate Common Name (CN):yago.fun
Issuer Distinguished Name (DN):WE1
TLS Version:TLS 1.2
First seen:2026-01-17 12:47:46 UTC
Last seen:2026-01-22 13:10:02 UTC
Status:Blacklisted
Listing reason:Vidar C&C
Listing date:2026-02-04 13:22:55
Malware samples:6
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2026-01-22 13:10:0213122c8cb5e417761626f69290aa0329n/a104.21.33.64:443
2026-01-22 05:33:01d24a3d113aed11c735be1bde61300312n/a104.21.33.64:443
2026-01-21 20:56:36c1d68b52c9d8269ea666a4a27074859fn/a104.21.33.64:443
2026-01-21 14:36:54c1450ae573c7becfd0cf1770c86371e5n/a104.21.33.64:443
2026-01-21 13:20:189d3405134b21371425d2cc57b432fe3cn/a104.21.33.64:443
2026-01-17 12:47:46de759b982cef6d8ddf704aa69feed9d4n/a172.67.159.70:443

# of entries: 6 (max: 100)