SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint f5c1535a672aa62647a8ddb8f35dda7be9d683c1.

Database Entry


SHA1 Fingerprint:f5c1535a672aa62647a8ddb8f35dda7be9d683c1
Certificate Common Name (CN):lomhasnopryiyome.top
Issuer Distinguished Name (DN):R3
TLS Version:TLS 1.2
First seen:2021-04-09 10:08:36 UTC
Last seen:2021-04-10 19:18:25 UTC
Status:Blacklisted
Listing reason:RaccoonStealer C&C
Listing date:2021-04-11 07:57:50
Malware samples:10
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2021-04-10 19:18:255a3c48f77e9ae0f7843d5bcce85657f6n/aRaccoonStealer45.139.187.144:443
2021-04-10 17:42:111fb346f46594594b2cf56f879c12ae3fn/aRaccoonStealer45.139.187.144:443
2021-04-10 17:18:461c1f6a12a1f54c60ed4b3b6003cdeea8Virustotal results 38 / 70 (54.29%) 45.139.187.144:443
2021-04-10 16:00:27f815c25b95944f53afd8e9888c96d353n/aRaccoonStealer45.139.187.144:443
2021-04-10 15:21:18f3ffd60f8e869e867deda0ed7c370dd1Virustotal results 22 / 69 (31.88%) RaccoonStealer45.139.187.144:443
2021-04-09 23:01:007afdd751affbebb84d95537cf9203a47Virustotal results 34 / 69 (49.28%) RaccoonStealer45.139.187.144:443
2021-04-09 22:57:4074f40695d6e8b7554652a2ccab0e24e4Virustotal results 43 / 69 (62.32%) ArkeiStealer45.139.187.144:443
2021-04-09 22:42:066ed7376ebe0e8bbeac68c95ab62d7cd3Virustotal results 29 / 69 (42.03%) RaccoonStealer45.139.187.144:443
2021-04-09 22:37:246ac0934c80d6a1799e9cc4a7bf986becVirustotal results 42 / 68 (61.76%) RaccoonStealer45.139.187.144:443
2021-04-09 10:08:36a865d93cba17441aae95a281d7fb69ceVirustotal results 10 / 56 (17.86%) 195.123.215.67:443

# of entries: 10 (max: 100)