SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ec08892079475eb36c230465f69d26104f05077c.
Database Entry
SHA1 Fingerprint: | ec08892079475eb36c230465f69d26104f05077c |
---|---|
Certificate Common Name (CN): | openlitespeed-wordpress-v13, C=US, L=Virtual, O=LiteSpeedCommunity, OU=Testing, ST=New Jersey, Email=., OID(2.5.4.41)=openlitespeed, OID(2.5.4.43)=CP, OID(2.5.4.46)=openlitespeed |
Issuer Distinguished Name (DN): | openlitespeed-wordpress-v13, C=US, L=Virtual, O=LiteSpeedCommunity, OU=Testing, ST=New Jersey, Email=., OID(2.5.4.41)=openlitespeed, OID(2.5.4.43)=CP, OID(2.5.4.46)=openlitespeed |
TLS Version: | TLS 1.2 |
First seen: | 2020-12-04 02:35:51 UTC |
Last seen: | 2021-03-08 13:05:42 UTC |
Status: | Blacklisted |
Listing reason: | ZLoader C&C |
Listing date: | 2020-12-26 08:08:11 |
Malware samples: | 4 |
Botnet C&Cs: | 2 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2021-03-08 13:05:42 | 7c9d7c71b76213e6afd2202742d81ca0 | n/a | 64.225.20.68:443 | |
2021-03-08 13:05:42 | 7c9d7c71b76213e6afd2202742d81ca0 | n/a | 64.225.20.68:443 | |
2021-01-05 08:14:57 | 3ee2af86460d199eceaccb952fda1ade | 36 / 70 (51.43%) | ZLoader | 178.128.220.110:443 |
2021-01-05 08:14:57 | 3ee2af86460d199eceaccb952fda1ade | 36 / 70 (51.43%) | ZLoader | 178.128.220.110:443 |
2020-12-25 10:17:21 | 3b0c5d532922be20ae151490e7109c60 | 50 / 71 (70.42%) | ZLoader | 178.128.220.110:443 |
2020-12-25 10:17:21 | 3b0c5d532922be20ae151490e7109c60 | 50 / 71 (70.42%) | ZLoader | 178.128.220.110:443 |
2020-12-04 02:35:51 | b974f1ad2d449d7d4cb38922a8c0fe8b | 54 / 71 (76.06%) | ZLoader | 178.128.220.110:443 |
2020-12-04 02:35:51 | b974f1ad2d449d7d4cb38922a8c0fe8b | 54 / 71 (76.06%) | ZLoader | 178.128.220.110:443 |
# of entries: 8 (max: 100)