SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint dbf9203100d0c74c61b9c7cfc88814d4bd6ed2ee.

Database Entry


SHA1 Fingerprint:dbf9203100d0c74c61b9c7cfc88814d4bd6ed2ee
Certificate Common Name (CN):nikolay-romanov.su
Issuer Distinguished Name (DN):WE1
TLS Version:TLS 1.2
First seen:2025-01-16 12:12:48 UTC
Last seen:2025-01-17 08:03:48 UTC
Status:Blacklisted
Listing reason:LummaStealer C&C
Listing date:2025-01-17 07:48:22
Malware samples:16
Botnet C&Cs:7

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2025-01-17 08:03:48bb4ca5f3fed452a6a466143c707c2903n/a104.21.32.1:443
2025-01-17 04:30:21878e1d97d0fcc4b2dc3ac0050b7bf677n/a104.21.80.1:443
2025-01-17 03:58:0874327e5d3547d18e9042816ed2fe8e7cn/a104.21.16.1:443
2025-01-17 03:18:235c5ec748c591a61644dad8a69575e734n/a104.21.96.1:443
2025-01-17 02:54:32503be4eafffdb86bdaea3c6fa0b7c228n/a104.21.96.1:443
2025-01-17 01:49:49335b9a0d35c92d69f973efa05a564206n/a104.21.64.1:443
2025-01-17 00:28:37098cb23a5a4366267d59b19074791c66n/a104.21.16.1:443
2025-01-16 23:20:344bee2971a0b6e440cfde304b628142c0n/a104.21.80.1:443
2025-01-16 23:14:574905b2139feb6968094385ec54e4f428n/a104.21.96.1:443
2025-01-16 21:35:2704b384eb4a74ab77b359dfda4466ae1cn/a104.21.112.1:443
2025-01-16 20:07:059622bd65ff88f8e637d50ba2ce794d82n/a104.21.96.1:443
2025-01-16 19:51:380a03084bf2bdcde731a3cc0a924a49d5n/a104.21.16.1:443
2025-01-16 16:32:30f64bac9b25bb5d72c26f8eb853174b6fn/a104.21.112.1:443
2025-01-16 15:04:16f4c05e7aacfbaba7c021e411d4f4c71an/a104.21.48.1:443
2025-01-16 12:40:38d112f3f6ef0d03985bf5f132228fba3an/a104.21.112.1:443
2025-01-16 12:12:48cacaeae640274b7e1d8d070262337c81n/a104.21.64.1:443

# of entries: 16 (max: 100)