SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint bebc4e8632a3c0c0559463298a4a7c39c3a0ca29.
Database Entry
| SHA1 Fingerprint: | bebc4e8632a3c0c0559463298a4a7c39c3a0ca29 |
|---|---|
| Certificate Common Name (CN): | avocado.gay |
| Issuer Distinguished Name (DN): | WE1 |
| TLS Version: | TLS 1.2 |
| First seen: | 2025-11-27 20:11:50 UTC |
| Last seen: | 2025-12-08 12:52:32 UTC |
| Status: | Blacklisted |
| Listing reason: | MaksRAT C&C |
| Listing date: | 2025-12-08 15:33:21 |
| Malware samples: | 3 |
| Botnet C&Cs: | 2 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
|---|---|---|---|---|
| 2025-12-08 12:52:32 | f95cbd8909254e547055f53768f37e22 | n/a | 172.67.203.124:443 | |
| 2025-12-02 22:07:05 | 01f22e75af63ab43808aff5301e4b214 | n/a | 104.21.22.84:443 | |
| 2025-11-27 20:11:50 | a181a69259ee76035ba7520f217e4dff | n/a | 104.21.22.84:443 |
# of entries: 3 (max: 100)