SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint fc104d36d3dda98cc051074379cf4832ac048998.
Database Entry
SHA1 Fingerprint: | fc104d36d3dda98cc051074379cf4832ac048998 |
---|---|
Certificate Common Name (CN): | C=XX, L=Default City, O=Default Company Ltd |
Issuer Distinguished Name (DN): | C=XX, L=Default City, O=Default Company Ltd |
TLS Version: | SSLv3 |
First seen: | 2015-11-14 06:51:29 UTC |
Last seen: | 2015-11-28 19:01:35 UTC |
Status: | Blacklisted |
Listing reason: | FindPOS C&C |
Listing date: | 2015-11-14 08:38:57 |
Malware samples: | 3 |
Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
---|---|---|---|---|
2015-11-28 19:01:35 | 504a45efe9889d874065e7b986c5b3a0 | 31/52 (59.62%) | FindPOS | 91.200.14.87:443 |
2015-11-28 19:01:35 | 504a45efe9889d874065e7b986c5b3a0 | 31/52 (59.62%) | FindPOS | 91.200.14.87:443 |
2015-11-16 07:39:00 | f2737b5c7802b5a22aa2da8840e176fa | 13/55 (23.64%) | FindPOS | 91.200.14.87:443 |
2015-11-16 07:39:00 | f2737b5c7802b5a22aa2da8840e176fa | 13/55 (23.64%) | FindPOS | 91.200.14.87:443 |
2015-11-14 06:51:29 | 4dc915726dcbe52819f7b020ce9a8bfc | 34/55 (61.82%) | FindPOS | 91.200.14.87:443 |
2015-11-14 06:51:29 | 4dc915726dcbe52819f7b020ce9a8bfc | 34/55 (61.82%) | FindPOS | 91.200.14.87:443 |
# of entries: 6 (max: 100)