SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 9849890d6e4cdb974c1ca9af43ff4171277f051a.

Database Entry


SHA1 Fingerprint:9849890d6e4cdb974c1ca9af43ff4171277f051a
Certificate Common Name (CN):stanculinaryblog.top
Issuer Distinguished Name (DN):R3
TLS Version:TLS 1.2
First seen:2021-12-01 00:16:29 UTC
Last seen:2021-12-01 15:13:46 UTC
Status:Blacklisted
Listing reason:RaccoonStealer C&C
Listing date:2021-12-01 16:58:42
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-12-01 15:13:46644efffdad7344470d472d582f695796n/aRaccoonStealer194.104.136.42:443
2021-12-01 02:12:12f3b1545181da995a1bbd95315c970684Virustotal results 34 / 64 (53.12%) RaccoonStealer194.104.136.42:443
2021-12-01 00:16:29e6dc17c601029f8009574f5776db1eadVirustotal results 31 / 64 (48.44%) GCleaner194.104.136.42:443

# of entries: 3 (max: 100)