SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ca3d33bae17617a6d1a3b6fddafd36222f3c67c9.
Database Entry
SHA1 Fingerprint: | ca3d33bae17617a6d1a3b6fddafd36222f3c67c9 |
---|---|
Certificate Common Name (CN): | 5.75.220.180 |
Issuer Distinguished Name (DN): | 5.75.220.180 |
TLS Version: | TLS 1.2 |
First seen: | 2024-01-04 15:43:22 UTC |
Last seen: | 2024-01-07 13:02:49 UTC |
Status: | Blacklisted |
Listing reason: | Vidar C&C |
Listing date: | 2024-01-07 16:59:19 |
Malware samples: | 10 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2024-01-07 13:02:49 | d032aef63bd82dc21b4b8dd5f61a9e8d | n/a | Ransomware.Stop | 5.75.220.180:2024 |
2024-01-07 10:10:06 | a5a68c6f0f7e2084e1b8569155a3c3c7 | n/a | TeamBot | 5.75.220.180:2024 |
2024-01-07 06:47:25 | e9d75f74b01bf25c64ee9624a266e6e1 | n/a | GCleaner | 5.75.220.180:2024 |
2024-01-07 02:44:16 | 7269876972dcb76c87b9ddd34850d60e | 29 / 69 (42.03%) | Vidar | 5.75.220.180:2024 |
2024-01-07 01:10:18 | f826aaa5b56d9dbc134696d3a9929fc7 | 27 / 69 (39.13%) | Ransomware.Stop | 5.75.220.180:2024 |
2024-01-05 07:47:27 | 774a81e87f2f0c8fda326dff10998caf | n/a | Ransomware.Stop | 5.75.220.180:2024 |
2024-01-05 06:27:17 | 35b649519db980df3a4806d3f27d862c | n/a | Ransomware.Stop | 5.75.220.180:2024 |
2024-01-04 22:54:50 | 3472303302a11c233c4458062a369004 | n/a | Ransomware.Stop | 5.75.220.180:2024 |
2024-01-04 20:07:37 | 3323e5a9eba0117135110f973eea820f | 30 / 68 (44.12%) | Ransomware.Stop | 5.75.220.180:2024 |
2024-01-04 15:43:22 | b8c3d3271d8fb0711482a8178564c6fd | n/a | Ransomware.Stop | 5.75.220.180:2024 |
# of entries: 10 (max: 100)