SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint 9cc93e0add5efdf43bc566836e5666d7049701ed.
Database Entry
SHA1 Fingerprint: | 9cc93e0add5efdf43bc566836e5666d7049701ed |
---|---|
Certificate Common Name (CN): | presidentjunction.org/emailAddress=admin@presidentjunction.org |
Issuer Distinguished Name (DN): | presidentjunction.org/emailAddress=admin@presidentjunction.org |
TLS Version: | TLS 1.2 |
First seen: | 2015-08-14 09:28:55 UTC |
Last seen: | 2015-08-18 09:06:41 UTC |
Status: | Blacklisted |
Listing reason: | Gozi C&C |
Listing date: | 2015-08-14 09:35:54 |
Malware samples: | 2 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2015-08-18 09:06:41 | 6977acfd7a41de82c890247062f7f8c3 | 36/56 (64.29%) | Gozi | 217.23.7.121:443 |
2015-08-18 09:06:41 | 6977acfd7a41de82c890247062f7f8c3 | 36/56 (64.29%) | Gozi | 217.23.7.121:443 |
2015-08-14 09:28:55 | df968dfad38c0b28345d5e3b177a5392 | 2/57 (3.51%) | Gozi | 217.23.7.121:443 |
2015-08-14 09:28:55 | df968dfad38c0b28345d5e3b177a5392 | 2/57 (3.51%) | Gozi | 217.23.7.121:443 |
# of entries: 4 (max: 100)