SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ec08892079475eb36c230465f69d26104f05077c.

Database Entry


SHA1 Fingerprint:ec08892079475eb36c230465f69d26104f05077c
Certificate Common Name (CN):openlitespeed-wordpress-v13, C=US, L=Virtual, O=LiteSpeedCommunity, OU=Testing, ST=New Jersey, Email=., OID(2.5.4.41)=openlitespeed, OID(2.5.4.43)=CP, OID(2.5.4.46)=openlitespeed
Issuer Distinguished Name (DN):openlitespeed-wordpress-v13, C=US, L=Virtual, O=LiteSpeedCommunity, OU=Testing, ST=New Jersey, Email=., OID(2.5.4.41)=openlitespeed, OID(2.5.4.43)=CP, OID(2.5.4.46)=openlitespeed
TLS Version:TLS 1.2
First seen:2020-12-04 02:35:51 UTC
Last seen:2021-01-05 08:14:57 UTC
Status:Blacklisted
Listing reason:ZLoader C&C
Listing date:2020-12-26 08:08:11
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-01-05 08:14:573ee2af86460d199eceaccb952fda1adeVirustotal results 36 / 70 (51.43%) ZLoader 178.128.220.110:443
2020-12-25 10:17:213b0c5d532922be20ae151490e7109c60Virustotal results 50 / 71 (70.42%) ZLoader 178.128.220.110:443
2020-12-04 02:35:51b974f1ad2d449d7d4cb38922a8c0fe8bVirustotal results 54 / 71 (76.06%) ZLoader 178.128.220.110:443

# of entries: 3 (max: 100)