SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 8400096cc674d998e7d98b8e9de2023b619295a7.

Database Entry


SHA1 Fingerprint:8400096cc674d998e7d98b8e9de2023b619295a7
Certificate Common Name (CN):yuriy-gagarin.com
Issuer Distinguished Name (DN):WE1
TLS Version:TLS 1.2
First seen:2025-01-20 23:31:27 UTC
Last seen:2025-01-23 12:16:40 UTC
Status:Blacklisted
Listing reason:LummaStealer C&C
Listing date:2025-01-23 17:34:01
Malware samples:8
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2025-01-23 12:16:4043cb509079e4b1f95718eea36e38e8d2n/a172.67.199.224:443
2025-01-22 14:09:41de38af838149288d7ea683e778438ef2n/a104.21.82.94:443
2025-01-22 13:18:2051344a32625d3e6cfa57199da469e27cn/a104.21.82.94:443
2025-01-22 00:43:003166ec2df31f4344615bc713502e8913n/a172.67.199.224:443
2025-01-21 23:27:4927a5683f0af674f4b053e416cd616259n/a172.67.199.224:443
2025-01-21 20:33:1414a30d5b56582062b72fdf95e47a353dn/a104.21.82.94:443
2025-01-21 19:00:50084dd6526d81616014e3b379bfe26338n/a104.21.82.94:443
2025-01-20 23:31:277de4a17dfc66695461f0c6a70ca4ec49n/a104.21.82.94:443

# of entries: 8 (max: 100)