SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 8e294947d357fd2b76097edb2f30b2eb0e618717.

Database Entry


SHA1 Fingerprint:8e294947d357fd2b76097edb2f30b2eb0e618717
Certificate Common Name (CN):i706.bllunerurohers.adac
Issuer Distinguished Name (DN):i706.bllunerurohers.adac
TLS Version:TLSv1
First seen:2016-08-12 11:38:01 UTC
Last seen:2016-08-19 13:28:41 UTC
Status:Blacklisted
Listing reason:Dridex C&C
Listing date:2016-08-12 13:32:00
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2016-08-19 13:28:415a5dfe4ec70529af9f937f58399410cfVirustotal results 6/53 (11.32%) Dridex 205.186.154.79:13443
2016-08-19 13:28:415a5dfe4ec70529af9f937f58399410cfVirustotal results 6/53 (11.32%) Dridex 205.186.154.79:13443
2016-08-18 10:24:0412c04017f40b4ef7b9009a46147da813Virustotal results 11/55 (20.00%) Dridex 205.186.154.79:13443
2016-08-18 10:24:0412c04017f40b4ef7b9009a46147da813Virustotal results 11/55 (20.00%) Dridex 205.186.154.79:13443
2016-08-12 11:38:01d58ec78a177b82da975f2a42edfcdbadVirustotal results 21/54 (38.89%) Dridex 205.186.154.79:13443
2016-08-12 11:38:01d58ec78a177b82da975f2a42edfcdbadVirustotal results 21/54 (38.89%) Dridex 205.186.154.79:13443

# of entries: 6 (max: 100)