SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint ef36759e842b3c611be025c5237697eaada61b74.

Database Entry


SHA1 Fingerprint:ef36759e842b3c611be025c5237697eaada61b74
Certificate Common Name (CN):posseswsnc.top
Issuer Distinguished Name (DN):WE1
TLS Version:TLS 1.2
First seen:2025-05-15 17:22:17 UTC
Last seen:2025-05-16 03:56:13 UTC
Status:Blacklisted
Listing reason:LummaStealer C&C
Listing date:2025-05-16 09:40:22
Malware samples:5
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2025-05-16 03:56:137488b125e7528fc82fbf4b91128a0e8fn/a172.67.208.10:443
2025-05-16 02:47:42525311468541973179a22c0aaa69333fn/a172.67.208.10:443
2025-05-15 22:18:5403fe1657a5528ff4a8a136bb3e7d563bn/a172.67.208.10:443
2025-05-15 19:53:110218a1f25d584ee50f6d7322b009eea1n/a172.67.208.10:443
2025-05-15 17:22:171d4c7dcb8da6e30bbc4e685a25bc6609n/a104.21.53.25:443

# of entries: 5 (max: 100)