SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint fc104d36d3dda98cc051074379cf4832ac048998.

Database Entry


SHA1 Fingerprint:fc104d36d3dda98cc051074379cf4832ac048998
Certificate Common Name (CN):C=XX, L=Default City, O=Default Company Ltd
Issuer Distinguished Name (DN):C=XX, L=Default City, O=Default Company Ltd
TLS Version:SSLv3
First seen:2015-11-14 06:51:29 UTC
Last seen:2015-11-28 19:01:35 UTC
Status:Blacklisted
Listing reason:FindPOS C&C
Listing date:2015-11-14 08:38:57
Malware samples:3
Botnet C&Cs:1

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2015-11-28 19:01:35504a45efe9889d874065e7b986c5b3a0Virustotal results 31/52 (59.62%) FindPOS91.200.14.87:443
2015-11-28 19:01:35504a45efe9889d874065e7b986c5b3a0Virustotal results 31/52 (59.62%) FindPOS91.200.14.87:443
2015-11-16 07:39:00f2737b5c7802b5a22aa2da8840e176faVirustotal results 13/55 (23.64%) FindPOS91.200.14.87:443
2015-11-16 07:39:00f2737b5c7802b5a22aa2da8840e176faVirustotal results 13/55 (23.64%) FindPOS91.200.14.87:443
2015-11-14 06:51:294dc915726dcbe52819f7b020ce9a8bfcVirustotal results 34/55 (61.82%) FindPOS91.200.14.87:443
2015-11-14 06:51:294dc915726dcbe52819f7b020ce9a8bfcVirustotal results 34/55 (61.82%) FindPOS91.200.14.87:443

# of entries: 6 (max: 100)