SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 92efe0bbe681fbbe3cf5f536b0056e5f08fe59b6.

Database Entry


SHA1 Fingerprint:92efe0bbe681fbbe3cf5f536b0056e5f08fe59b6
Certificate Common Name (CN):paintingmercedes.top
Issuer Distinguished Name (DN):R3
TLS Version:TLS 1.2
First seen:2021-02-26 12:47:36 UTC
Last seen:2021-02-27 00:40:35 UTC
Status:Blacklisted
Listing reason:RaccoonStealer C&C
Listing date:2021-02-27 06:28:46
Malware samples:11
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-02-27 00:40:358e53e55e783fe04f560e6542093cfcdcVirustotal results 52 / 71 (73.24%) RaccoonStealer34.69.90.254:443
2021-02-26 22:59:057baa094612080cf5d330d6f0e79acdean/a34.69.90.254:443
2021-02-26 22:25:1070ecd3ec6decc87bffe9ea81f1359c2bVirustotal results 34 / 68 (50.00%) RaccoonStealer34.69.90.254:443
2021-02-26 22:11:3668f18e290695919241e4d9dcd3a54e61Virustotal results 24 / 70 (34.29%) RaccoonStealer34.69.90.254:443
2021-02-26 21:17:44198d946f1357b02cb46cd05e6f66ab2eVirustotal results 45 / 71 (63.38%) 34.69.90.254:443
2021-02-26 21:17:092134a0076dd217612e0e67145280d757n/aRaccoonStealer34.69.90.254:443
2021-02-26 20:21:035726d4ef79722594f222aee3b5bd4963Virustotal results 43 / 71 (60.56%) RaccoonStealer34.69.90.254:443
2021-02-26 20:10:219584fdd0093f7612a06159f37e50aa32n/aRaccoonStealer34.69.90.254:443
2021-02-26 19:20:2285a8de2d7ce5d76102908b62db78153bVirustotal results 29 / 70 (41.43%) RaccoonStealer34.69.90.254:443
2021-02-26 18:34:39d93f322e915785edd46779a708e4f6d1Virustotal results 25 / 70 (35.71%) RaccoonStealer34.69.90.254:443
2021-02-26 12:47:36ab68ec406233baf1d24efca2d5d59a4cVirustotal results 40 / 68 (58.82%) RaccoonStealer34.69.90.254:443

# of entries: 11 (max: 100)