SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 7fd9da4afb65569f0f48d0ccebb9acb8ede7ca9b.

Database Entry


SHA1 Fingerprint:7fd9da4afb65569f0f48d0ccebb9acb8ede7ca9b
Certificate Common Name (CN):benokij.com
Issuer Distinguished Name (DN):R3
TLS Version:TLS 1.2
First seen:2022-03-11 23:11:13 UTC
Last seen:2022-03-12 07:56:09 UTC
Status:Blacklisted
Listing reason:CobaltStrike C&C
Listing date:2022-03-12 07:52:03
Malware samples:5
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2022-03-12 07:56:0973c80191ae59badeab29feff2c83a9edn/a139.60.161.165:443
2022-03-12 04:12:2687e6673eaa717f4184acbcdbdc6a7f87n/aCobaltStrike139.60.161.165:443
2022-03-12 03:11:56fd6772827214afeab0f0392fc45ed997n/aCobaltStrike139.60.161.165:443
2022-03-12 00:44:280d9ef0bd89a38e4202f7bd0ed9dcb6edn/aCobaltStrike139.60.161.165:443
2022-03-11 23:11:131724eb4d95f92705e847bfcf0413100dn/aCobaltStrike139.60.161.165:443

# of entries: 5 (max: 100)