SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint a060d43f584a7d2f838b6d64aff4076df766a1b9.
Database Entry
SHA1 Fingerprint: | a060d43f584a7d2f838b6d64aff4076df766a1b9 |
---|---|
Certificate Common Name (CN): | *.pillspharm24.com |
Issuer Distinguished Name (DN): | DigiCert SHA2 Secure Server CA |
TLS Version: | SSLv3 |
First seen: | 2015-06-12 17:49:03 UTC |
Last seen: | 2015-07-12 18:38:43 UTC |
Status: | Blacklisted |
Listing reason: | Ransomware C&C |
Listing date: | 2015-06-14 11:25:32 |
Malware samples: | 13 |
Botnet C&Cs: | 2 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2015-07-12 18:38:43 | 7cb21bcc7b2581a55b9ee1ab8f1c32d5 | 31/55 (56.36%) | Teslacrypt | 78.47.143.212:443 |
2015-07-12 18:38:43 | 7cb21bcc7b2581a55b9ee1ab8f1c32d5 | 31/55 (56.36%) | Teslacrypt | 78.47.143.212:443 |
2015-07-12 16:18:57 | bda192feb508354713e93e26e2ee455a | 26/55 (47.27%) | Teslacrypt | 78.47.143.212:443 |
2015-07-12 16:18:57 | bda192feb508354713e93e26e2ee455a | 26/55 (47.27%) | Teslacrypt | 78.47.143.212:443 |
2015-07-11 22:46:56 | 1ae3a9333c92e8880efa7ae4e52f305f | n/a | Ransomware | 78.47.143.212:443 |
2015-07-11 22:46:56 | 1ae3a9333c92e8880efa7ae4e52f305f | n/a | Ransomware | 78.47.143.212:443 |
2015-07-11 17:03:30 | 9d63e7bddf49390bd129354a612b3a75 | 16/56 (28.57%) | Ransomware | 78.47.143.212:443 |
2015-07-11 17:03:30 | 9d63e7bddf49390bd129354a612b3a75 | 16/56 (28.57%) | Ransomware | 78.47.143.212:443 |
2015-07-11 11:34:57 | 186e51c84fcf445c640ae326ac7a21ec | 5/55 (9.09%) | Ransomware | 78.47.143.212:443 |
2015-07-11 11:34:57 | 186e51c84fcf445c640ae326ac7a21ec | 5/55 (9.09%) | Ransomware | 78.47.143.212:443 |
2015-07-10 11:53:10 | 29e93f6d8c88ff8175a71d738e3231b7 | 8/56 (14.29%) | Spambot.Kelihos | 78.47.143.212:443 |
2015-07-10 11:53:10 | 29e93f6d8c88ff8175a71d738e3231b7 | 8/56 (14.29%) | Spambot.Kelihos | 78.47.143.212:443 |
2015-06-15 13:20:18 | 2d35b0faab482c692f0c79b0b0a0550a | 6/57 (10.53%) | Ransomware | 78.47.28.178:443 |
2015-06-15 13:20:18 | 2d35b0faab482c692f0c79b0b0a0550a | 6/57 (10.53%) | Ransomware | 78.47.28.178:443 |
2015-06-15 05:43:35 | 71b55f6a8d4b5e0d2d5f302221426764 | 4/57 (7.02%) | Ransomware | 78.47.28.178:443 |
2015-06-15 05:43:35 | 71b55f6a8d4b5e0d2d5f302221426764 | 4/57 (7.02%) | Ransomware | 78.47.28.178:443 |
2015-06-14 19:22:47 | 803f00ca256e7808becd023c8f4effc5 | n/a | Ransomware | 78.47.28.178:443 |
2015-06-14 19:22:47 | 803f00ca256e7808becd023c8f4effc5 | n/a | Ransomware | 78.47.28.178:443 |
2015-06-14 07:56:41 | 0d7c227d4616254f9ae4976270f2f398 | 12/57 (21.05%) | Ransomware | 78.47.28.178:443 |
2015-06-14 07:56:41 | 0d7c227d4616254f9ae4976270f2f398 | 12/57 (21.05%) | Ransomware | 78.47.28.178:443 |
2015-06-13 21:32:11 | 1b4e97af9f327126146338b8cd21dd86 | 8/57 (14.04%) | Ransomware | 78.47.28.178:443 |
2015-06-13 21:32:11 | 1b4e97af9f327126146338b8cd21dd86 | 8/57 (14.04%) | Ransomware | 78.47.28.178:443 |
2015-06-13 09:03:22 | 60f45b8556bd29cfeeb42e94c828915c | 12/57 (21.05%) | Ransomware | 78.47.28.178:443 |
2015-06-13 09:03:22 | 60f45b8556bd29cfeeb42e94c828915c | 12/57 (21.05%) | Ransomware | 78.47.28.178:443 |
2015-06-12 17:49:03 | 841e6f7989172256d278fb98e8643beb | 6/57 (10.53%) | Ransomware | 78.47.28.178:443 |
2015-06-12 17:49:03 | 841e6f7989172256d278fb98e8643beb | 6/57 (10.53%) | Ransomware | 78.47.28.178:443 |
# of entries: 26 (max: 100)