SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ee41ce807f7f4eff5562c6a32dcf2cc225a12e73.
Database Entry
| SHA1 Fingerprint: | ee41ce807f7f4eff5562c6a32dcf2cc225a12e73 |
|---|---|
| Certificate Common Name (CN): | woundsecretary.xyz |
| Issuer Distinguished Name (DN): | WE1 |
| TLS Version: | TLS 1.2 |
| First seen: | 2026-01-30 22:00:29 UTC |
| Last seen: | 2026-02-04 01:36:43 UTC |
| Status: | Blacklisted |
| Listing reason: | OffLoader C&C |
| Listing date: | 2026-02-09 07:03:08 |
| Malware samples: | 3 |
| Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
|---|---|---|---|---|
| 2026-02-04 01:36:43 | 4ce6ae9b1ade70807cb48123987cc496 | n/a | 104.21.43.121:443 | |
| 2026-02-03 22:21:47 | 2e1de50a06372e92683aa45543959f36 | n/a | 104.21.43.121:443 | |
| 2026-01-30 22:00:29 | 1b25ac4e8d5488ac2f26a3c84d7f9c05 | n/a | 104.21.43.121:443 |
# of entries: 3 (max: 100)