SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint f620d77ae93045dda98a0c51be21cf1dd9df0872.
Database Entry
SHA1 Fingerprint: | f620d77ae93045dda98a0c51be21cf1dd9df0872 |
---|---|
Certificate Common Name (CN): | crookedfoshe.bond |
Issuer Distinguished Name (DN): | WE1 |
TLS Version: | TLS 1.2 |
First seen: | 2025-01-16 02:37:31 UTC |
Last seen: | 2025-01-16 03:12:46 UTC |
Status: | Blacklisted |
Listing reason: | LummaStealer C&C |
Listing date: | 2025-01-16 07:23:40 |
Malware samples: | 5 |
Botnet C&Cs: | 3 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2025-01-16 03:12:46 | f0bbbee2fc1a7c33f858b0d528714787 | n/a | 104.21.112.1:443 | |
2025-01-16 03:11:23 | e3c08d814753036fa7b279763643675c | n/a | 104.21.16.1:443 | |
2025-01-16 03:04:30 | b09bfb2d0b3602906a6708a19ace977c | n/a | 104.21.16.1:443 | |
2025-01-16 02:56:10 | 7e56318f2f4702a5391327bc97f93382 | n/a | 104.21.112.1:443 | |
2025-01-16 02:37:31 | 02b948faeec194366df75d47258c0c7c | n/a | 104.21.80.1:443 |
# of entries: 5 (max: 100)