SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 99d9d01f4781e0e4d1b2a73cfdd6aa026a8d2ca9.

Database Entry


SHA1 Fingerprint:99d9d01f4781e0e4d1b2a73cfdd6aa026a8d2ca9
Certificate Common Name (CN):localhost
Issuer Distinguished Name (DN):localhost
TLS Version:TLSv1
First seen:2015-06-19 21:56:02 UTC
Last seen:2015-06-20 19:22:00 UTC
Status:Blacklisted
Listing reason:KINS C&C
Listing date:2015-06-21 08:00:14
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2015-06-20 19:22:00391649409571f7e29fe00e482f605ea7Virustotal results 7/57 (12.28%) ZeuS 86.105.195.109:443
2015-06-20 19:22:00391649409571f7e29fe00e482f605ea7Virustotal results 7/57 (12.28%) ZeuS 86.105.195.109:443
2015-06-19 21:56:02fb49c610e2a4276a6c2d217d0c5593b3Virustotal results 3/57 (5.26%) ZeuS 86.105.195.109:443
2015-06-19 21:56:02fb49c610e2a4276a6c2d217d0c5593b3Virustotal results 3/57 (5.26%) ZeuS 86.105.195.109:443

# of entries: 4 (max: 100)