SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint e320203a27a9445f7e8cc730c90c73fb5d711b9e.
Database Entry
SHA1 Fingerprint: | e320203a27a9445f7e8cc730c90c73fb5d711b9e |
---|---|
Certificate Common Name (CN): | crushedwildly.top |
Issuer Distinguished Name (DN): | WE1 |
TLS Version: | TLS 1.2 |
First seen: | 2025-06-12 20:34:15 UTC |
Last seen: | 2025-06-18 23:06:42 UTC |
Status: | Blacklisted |
Listing reason: | ACRStealer C&C |
Listing date: | 2025-06-19 05:42:44 |
Malware samples: | 3 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2025-06-18 23:06:42 | b3c9fe85a24a06e71b384bc37cbc0b89 | n/a | 104.21.23.35:443 | |
2025-06-17 22:03:24 | 2896923e3691258dae92f2c6a6241489 | n/a | 104.21.23.35:443 | |
2025-06-12 20:34:15 | bcb1a69df17052d530fbec4bc17a3d34 | n/a | 104.21.23.35:443 |
# of entries: 3 (max: 100)