SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint c2b713c6602e8844e2f4cf10b808031f9b2eebbe.
Database Entry
SHA1 Fingerprint: | c2b713c6602e8844e2f4cf10b808031f9b2eebbe |
---|---|
Certificate Common Name (CN): | cooawbi.top |
Issuer Distinguished Name (DN): | WE1 |
TLS Version: | TLS 1.2 |
First seen: | 2025-07-18 13:24:16 UTC |
Last seen: | 2025-07-19 03:19:56 UTC |
Status: | Blacklisted |
Listing reason: | LummaStealer C&C |
Listing date: | 2025-07-19 07:04:43 |
Malware samples: | 9 |
Botnet C&Cs: | 4 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2025-07-19 03:19:56 | 91d0e777ac0038b77f5e37eb541c095e | n/a | 104.21.96.1:443 | |
2025-07-19 00:01:42 | 022d128aed4bb859e214eab63ae4513e | n/a | 104.21.32.1:443 | |
2025-07-18 21:24:54 | f5459d83d1003a15eceff4b0c0e52809 | n/a | 104.21.32.1:443 | |
2025-07-18 19:53:29 | b862f396607db859f2ef7462ae4d73a0 | n/a | 104.21.32.1:443 | |
2025-07-18 18:39:50 | 0a3166dc0caee149cddf3e99c7bf23db | n/a | 104.21.112.1:443 | |
2025-07-18 18:35:22 | c65a98d92282ad7977e54eae3c53e9cb | n/a | 104.21.112.1:443 | |
2025-07-18 17:29:34 | b9808ecae15f5cf083380c380a883bd4 | n/a | 104.21.16.1:443 | |
2025-07-18 15:50:35 | baa1966ac361e9c72ce998193ce48c55 | n/a | 104.21.112.1:443 | |
2025-07-18 13:24:16 | 7b57018f586dc3dfde77fae529d795df | n/a | 104.21.16.1:443 |
# of entries: 9 (max: 100)