SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint c5036f5e25b19c8d376e175283500bbce4a4d19a.

Database Entry


SHA1 Fingerprint:c5036f5e25b19c8d376e175283500bbce4a4d19a
Certificate Common Name (CN):tudellmaiofs.actor
Issuer Distinguished Name (DN):tudellmaiofs.actor
TLS Version:TLS 1.2
First seen:2016-12-24 16:24:12 UTC
Last seen:2016-12-27 08:37:01 UTC
Status:Blacklisted
Listing reason:Dridex C&C
Listing date:2016-12-25 08:54:03
Malware samples:2
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2016-12-27 08:37:014bf93c42a916e1bbf339c03f0f850a52Virustotal results 33/57 (57.89%) Dridex 212.200.111.170:4431
2016-12-27 08:37:014bf93c42a916e1bbf339c03f0f850a52Virustotal results 33/57 (57.89%) Dridex 212.200.111.170:4431
2016-12-24 16:24:12c1071758777830a19260d4c2bdfdc80cVirustotal results 35/57 (61.40%) Dridex 212.200.111.170:4431
2016-12-24 16:24:12c1071758777830a19260d4c2bdfdc80cVirustotal results 35/57 (61.40%) Dridex 212.200.111.170:4431

# of entries: 4 (max: 100)