SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 795ae7766804580ee7d3db01ce24a178df9ede23.

Database Entry


SHA1 Fingerprint:795ae7766804580ee7d3db01ce24a178df9ede23
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:SSLv3
First seen:2016-06-29 17:47:10 UTC
Last seen:2016-12-31 18:07:14 UTC
Status:Blacklisted
Listing reason:FindPOS C&C
Listing date:2016-07-05 14:40:01
Malware samples:4
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2016-12-31 18:07:14e86046c255308834ccb572e72e3cc4d2Virustotal results 32/57 (56.14%) FindPOS62.76.103.206:443
2016-10-27 09:18:0367d7df129325c7c836ab752a08d08a80Virustotal results 20/57 (35.09%) FindPOS62.76.103.206:443
2016-07-04 09:25:123036696807750309d7a0435f7fe95120n/aFindPOS62.76.103.206:443
2016-06-29 17:47:10b50ba62c24dd6b813cc0f75b89c82c64Virustotal results 37/56 (66.07%) FindPOS62.76.103.206:443

# of entries: 4 (max: 100)