SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint bd397b0541a583d86f22ef8778b599674045ca5e.

Database Entry


SHA1 Fingerprint:bd397b0541a583d86f22ef8778b599674045ca5e
Certificate Common Name (CN):mindbreaker.top
Issuer Distinguished Name (DN):R3
TLS Version:TLS 1.2
First seen:2021-04-16 16:56:11 UTC
Last seen:2021-04-16 23:47:42 UTC
Status:Blacklisted
Listing reason:RaccoonStealer C&C
Listing date:2021-04-17 10:48:48
Malware samples:4
Botnet C&Cs:3

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-04-16 23:47:42bbaed62fd1930fd5068902af948e3332Virustotal results 41 / 70 (58.57%) 185.212.131.90:443
2021-04-16 22:25:427650069fa0c30580ab919115fadad32dVirustotal results 30 / 69 (43.48%) RaccoonStealer141.136.0.105:443
2021-04-16 21:43:295e325232d7a100ccfb210556c688a1c9Virustotal results 47 / 68 (69.12%) RaccoonStealer185.212.131.90:443
2021-04-16 16:56:11deaf1da374b0f265ea9c484c68cc8871Virustotal results 36 / 68 (52.94%) Adware.FileTour195.54.33.143:443

# of entries: 4 (max: 100)