SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 736ce32aa038d723891771801cb7ed5c76a96aa2.
Database Entry
| SHA1 Fingerprint: | 736ce32aa038d723891771801cb7ed5c76a96aa2 |
|---|---|
| Certificate Common Name (CN): | afspfigjeb.cn |
| Issuer Distinguished Name (DN): | R3 |
| TLS Version: | TLS 1.2 |
| First seen: | 2021-06-29 05:07:52 UTC |
| Last seen: | 2021-06-29 06:39:51 UTC |
| Status: | Blacklisted |
| Listing reason: | ServHelper C&C |
| Listing date: | 2021-06-29 05:57:23 |
| Malware samples: | 5 |
| Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
|---|---|---|---|---|
| 2021-06-29 06:39:51 | 3e5f7134a37387c969041fd381641bfd | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 06:39:51 | 3e5f7134a37387c969041fd381641bfd | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 06:32:58 | cd7e60d216b11bcfb68cf59d2ee7b150 | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 06:32:58 | cd7e60d216b11bcfb68cf59d2ee7b150 | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 06:18:36 | 2152351a45a479dc8f5317f200bf0444 | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 06:18:36 | 2152351a45a479dc8f5317f200bf0444 | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 05:39:24 | 813dc617d830f5d3b4906457378f63dc | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 05:39:24 | 813dc617d830f5d3b4906457378f63dc | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 05:07:52 | fc923a62cc83baa86387b3bb92fcb5ed | RaccoonStealer | 45.61.137.91:443 | |
| 2021-06-29 05:07:52 | fc923a62cc83baa86387b3bb92fcb5ed | RaccoonStealer | 45.61.137.91:443 |
# of entries: 10 (max: 100)