SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint b6f84c4ce2413e59d9d7a895b9343f64819890d5.

Database Entry


SHA1 Fingerprint:b6f84c4ce2413e59d9d7a895b9343f64819890d5
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:TLS 1.1
First seen:2018-09-04 19:06:33 UTC
Last seen:2018-09-05 05:51:02 UTC
Status:Blacklisted
Listing reason:PandaZeuS C&C
Listing date:2018-09-05 06:09:07
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2018-09-05 05:51:02c56f5900683a2e584061a2cebc2fc521Virustotal results 23/68 (33.82%) Downloader.Pony77.222.55.7:443
2018-09-05 05:51:02c56f5900683a2e584061a2cebc2fc521Virustotal results 23/68 (33.82%) Downloader.Pony77.222.55.7:443
2018-09-04 19:06:33963c7472691ae08ea958e97095b213d5Virustotal results 24/61 (39.34%) Downloader.Pony77.222.55.7:443
2018-09-04 19:06:33963c7472691ae08ea958e97095b213d5Virustotal results 24/61 (39.34%) Downloader.Pony77.222.55.7:443

# of entries: 4 (max: 100)