SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint c6fe66a34a6fc3411ba76af8010eebd53bf5034f.

Database Entry

SHA1 Fingerprint:c6fe66a34a6fc3411ba76af8010eebd53bf5034f
Certificate Common Name (CN):COMODO ECC Domain Validation Secure Server CA 2
Issuer Distinguished Name (DN):COMODO ECC Domain Validation Secure Server CA 2
TLS Version:TLS 1.2
First seen:2019-12-17 14:53:52 UTC
Last seen:2020-01-16 02:16:38 UTC
Listing reason:Adwind C&C
Listing date:2019-12-17 15:37:16
Malware samples:5
Botnet C&Cs:1

Malware Samples

The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-01-16 02:16:387bb62a35cd7e3a96d9cce73eeba502edn/aAdwind185.244.30.244:2211
2020-01-08 13:30:54f3b5149c81324454735fd4614f54e737Virustotal results 24 / 59 (40.68%) Adwind185.244.30.244:2211
2019-12-21 11:48:472f13a0e637ae7bbc5094929a6b22bd57n/aAdwind185.244.30.244:2211
2019-12-20 10:09:099574e8aa2a2bdc3629e5478c4f780f5bn/aAdwind185.244.30.244:2211
2019-12-17 14:53:545a5a9b8c86c19fbf913e523c1885a5cen/aAdwind185.244.30.244:2211

# of entries: 5 (max: 100)