SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ee90552bae63b3f8c874bb66a96e1f7bb1e0a595.

Database Entry


SHA1 Fingerprint:ee90552bae63b3f8c874bb66a96e1f7bb1e0a595
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:SSLv3
First seen:2016-06-29 17:47:10 UTC
Last seen:2017-02-01 16:51:27 UTC
Status:Blacklisted
Listing reason:FindPOS C&C
Listing date:2016-07-05 14:39:58
Malware samples:6
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2017-02-01 16:51:27f104fccb4d3fd9fb8eaa8cee370c20c1Virustotal results 42/62 (67.74%) FindPOS92.63.100.227:443
2016-12-31 18:07:14e86046c255308834ccb572e72e3cc4d2Virustotal results 32/57 (56.14%) FindPOS92.63.100.227:443
2016-11-01 16:41:1940dfeb7c26a3f4a296964cc4c4a3eee2Virustotal results 27/56 (48.21%) FindPOS92.63.100.227:443
2016-10-14 09:51:443e9e14cd7158c7f9d8d8f8c165ad0476Virustotal results 29/56 (51.79%) FindPOS92.63.100.227:443
2016-07-04 09:25:123036696807750309d7a0435f7fe95120n/aFindPOS92.63.100.227:443
2016-06-29 17:47:10b50ba62c24dd6b813cc0f75b89c82c64Virustotal results 37/56 (66.07%) FindPOS92.63.100.227:443

# of entries: 6 (max: 100)