SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint f5e2b67a1e9249abacd04f68369b2a0dfb0b4fd7.

Database Entry


SHA1 Fingerprint:f5e2b67a1e9249abacd04f68369b2a0dfb0b4fd7
Certificate Common Name (CN):server9/emailAddress=root@server9
Issuer Distinguished Name (DN):server9/emailAddress=root@server9
TLS Version:SSLv3
First seen:2014-06-27 07:59:59 UTC
Last seen:never
Status:Blacklisted
Listing reason:KINS C&C
Listing date:2014-06-27 08:18:50
Malware samples:1
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2014-06-27 07:59:5908632a196e88203a70ff941cd1309587Virustotal results 24/53 (45.28%) ZeuS 146.185.248.23:443
2014-06-27 07:59:5908632a196e88203a70ff941cd1309587Virustotal results 24/53 (45.28%) ZeuS 146.185.248.23:443

# of entries: 2 (max: 100)