SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 6543b239d6afc8dda842420dae98d6ea199eca95.
Database Entry
| SHA1 Fingerprint: | 6543b239d6afc8dda842420dae98d6ea199eca95 |
|---|---|
| Certificate Common Name (CN): | 144.124.246.132 |
| Issuer Distinguished Name (DN): | 144.124.246.132 |
| TLS Version: | TLS 1.2 |
| First seen: | 2026-02-24 06:51:32 UTC |
| Last seen: | 2026-02-24 19:51:14 UTC |
| Status: | Blacklisted |
| Listing reason: | ACRStealer C&C |
| Listing date: | 2026-02-25 10:26:45 |
| Malware samples: | 3 |
| Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
|---|---|---|---|---|
| 2026-02-24 19:51:14 | dc5b7f8f482851a533491791e4394073 | n/a | 144.124.246.132:443 | |
| 2026-02-24 07:10:03 | 1435b920708fddebc7d95044bed7f947 | n/a | 144.124.246.132:443 | |
| 2026-02-24 06:51:33 | 2294094885d3f9af1d222859c2743791 | n/a | 144.124.246.132:443 |
# of entries: 3 (max: 100)