SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint c46fa929a34024cb6749417ad8ac3540f32d1aa8.
Database Entry
SHA1 Fingerprint: | c46fa929a34024cb6749417ad8ac3540f32d1aa8 |
---|---|
Certificate Common Name (CN): | tfIwajX |
Issuer Distinguished Name (DN): | tfIwajX |
TLS Version: | TLSv1 |
First seen: | 2023-03-23 19:29:45 UTC |
Last seen: | 2023-03-24 05:32:25 UTC |
Status: | Blacklisted |
Listing reason: | zgRAT C&C |
Listing date: | 2023-03-25 14:11:22 |
Malware samples: | 2 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2023-03-24 05:32:25 | 70d695075826843cc3038c80f6a8180a | 44 / 69 (63.77%) | 154.53.51.201:9901 | |
2023-03-23 19:29:45 | 3951f8ad7e0e7682fc0d9d13c9a503c5 | 23 / 69 (33.33%) | 154.53.51.201:9901 |
# of entries: 2 (max: 100)