SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 6171d10623d6850c8048fef17a4e0f8d6462b3e7.
Database Entry
| SHA1 Fingerprint: | 6171d10623d6850c8048fef17a4e0f8d6462b3e7 |
|---|---|
| Certificate Common Name (CN): | yago.fun |
| Issuer Distinguished Name (DN): | WE1 |
| TLS Version: | TLS 1.2 |
| First seen: | 2026-01-17 12:47:46 UTC |
| Last seen: | 2026-01-22 13:10:02 UTC |
| Status: | Blacklisted |
| Listing reason: | Vidar C&C |
| Listing date: | 2026-02-04 13:22:55 |
| Malware samples: | 6 |
| Botnet C&Cs: | 2 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
|---|---|---|---|---|
| 2026-01-22 13:10:02 | 13122c8cb5e417761626f69290aa0329 | n/a | 104.21.33.64:443 | |
| 2026-01-22 05:33:01 | d24a3d113aed11c735be1bde61300312 | n/a | 104.21.33.64:443 | |
| 2026-01-21 20:56:36 | c1d68b52c9d8269ea666a4a27074859f | n/a | 104.21.33.64:443 | |
| 2026-01-21 14:36:54 | c1450ae573c7becfd0cf1770c86371e5 | n/a | 104.21.33.64:443 | |
| 2026-01-21 13:20:18 | 9d3405134b21371425d2cc57b432fe3c | n/a | 104.21.33.64:443 | |
| 2026-01-17 12:47:46 | de759b982cef6d8ddf704aa69feed9d4 | n/a | 172.67.159.70:443 |
# of entries: 6 (max: 100)