SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint df9c32ddba0be96f0852bc593da3d78212b1d545.
Database Entry
SHA1 Fingerprint: | df9c32ddba0be96f0852bc593da3d78212b1d545 |
---|---|
Certificate Common Name (CN): | 0bg.ru |
Issuer Distinguished Name (DN): | EssentialSSL CA |
TLS Version: | SSLv3 |
First seen: | 2014-06-28 08:47:42 UTC |
Last seen: | 2014-06-28 08:49:14 UTC |
Status: | Blacklisted |
Listing reason: | KINS C&C |
Listing date: | 2014-06-28 09:17:03 |
Malware samples: | 2 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2014-06-28 08:49:14 | 35672b211206f20456d339b6b721fe3f | 21/53 (39.62%) | ZeuS | 108.61.198.109:443 |
2014-06-28 08:49:14 | 35672b211206f20456d339b6b721fe3f | 21/53 (39.62%) | ZeuS | 108.61.198.109:443 |
2014-06-28 08:47:42 | 20dddee5f07a73277e26dec05fde184d | 29/55 (52.73%) | ZeuS | 108.61.198.109:443 |
2014-06-28 08:47:42 | 20dddee5f07a73277e26dec05fde184d | 29/55 (52.73%) | ZeuS | 108.61.198.109:443 |
# of entries: 4 (max: 100)