SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint d996af9ab6c590a27a73358ddf377add5bf8c05e.

Database Entry


SHA1 Fingerprint:d996af9ab6c590a27a73358ddf377add5bf8c05e
Certificate Common Name (CN):eetownvulgar.xyz
Issuer Distinguished Name (DN):Let's Encrypt Authority X3
TLS Version:TLS 1.2
First seen:2020-04-02 16:07:38 UTC
Last seen:2020-04-02 17:37:52 UTC
Status:Blacklisted
Listing reason:ZLoader C&C
Listing date:2020-04-02 18:15:44
Malware samples:5
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-04-02 17:37:52c308f155c2f433bc04ac887c25cbd04dn/aZLoader 161.117.227.195:443
2020-04-02 17:07:04be324113b46365812fde6a163cee12a4n/aZLoader 161.117.227.195:443
2020-04-02 16:46:02880c54268d8a69e66c75aec10daf2046n/aZLoader 161.117.227.195:443
2020-04-02 16:38:5333558a0bd237a931942313f2a620d1d2n/aZLoader 161.117.227.195:443
2020-04-02 16:07:38893274f952158162c74b56ce68e16435n/aZLoader 161.117.227.195:443

# of entries: 5 (max: 100)