SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 9325003b383965fda1d346950304bbf7681be82c.

Database Entry


SHA1 Fingerprint:9325003b383965fda1d346950304bbf7681be82c
Certificate Common Name (CN):Gfiodorbllr, OU=Qtwuodpjhn, ST=pqydl, O=Mxiigcmxkikes, C=QN, L=Ylijpshtuejlt
Issuer Distinguished Name (DN):Gfiodorbllr, OU=Qtwuodpjhn, ST=pqydl, O=Mxiigcmxkikes, C=QN, L=Ylijpshtuejlt
TLS Version:TLS 1.2
First seen:2022-12-09 16:07:52 UTC
Last seen:2022-12-10 07:36:15 UTC
Status:Blacklisted
Listing reason:Malware C&C
Listing date:2022-12-10 08:00:19
Malware samples:5
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2022-12-10 07:36:159b8766beaadc34ad22a3ba260bb92f48Virustotal results 40 / 70 (57.14%) 103.144.139.157:443
2022-12-10 07:35:28435129050751ef6593bd738a96facd17Virustotal results 37 / 71 (52.11%) 103.144.139.157:443
2022-12-10 07:35:255115a6427f673dfb90945b01a5c0240fVirustotal results 27 / 71 (38.03%) Smoke Loader 103.144.139.157:443
2022-12-10 01:53:319cce410fbe2fbee4d66a69ca1717b114Virustotal results 35 / 69 (50.72%) 103.144.139.157:443
2022-12-09 16:07:52d04e6d8eb7c75079407f20eee7ed68daVirustotal results 32 / 70 (45.71%) 103.144.139.157:443

# of entries: 5 (max: 100)