SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint fd8aa2d4e1c4ea685f0466b50fc6efd4c1cc2deb.

Database Entry


SHA1 Fingerprint:fd8aa2d4e1c4ea685f0466b50fc6efd4c1cc2deb
Certificate Common Name (CN):COMODO ECC Domain Validation Secure Server CA 2
Issuer Distinguished Name (DN):COMODO ECC Domain Validation Secure Server CA 2
TLS Version:TLS 1.2' NOTBEF
First seen:2020-04-01 03:10:38 UTC
Last seen:2020-04-06 00:35:41 UTC
Status:Blacklisted
Listing reason:Adwind C&C
Listing date:2020-04-01 08:46:10
Malware samples:3
Botnet C&Cs:2

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2020-04-06 00:35:41ce53fe953a02eb48f63f34f62a1c3e50n/aAdwind185.140.53.53:1050
2020-04-06 00:35:41ce53fe953a02eb48f63f34f62a1c3e50n/aAdwind185.140.53.53:1050
2020-04-01 08:58:234c5efcef4aefd1a27b0e75e210bf96ffn/aAdwind216.38.2.208:1050
2020-04-01 08:58:234c5efcef4aefd1a27b0e75e210bf96ffn/aAdwind216.38.2.208:1050
2020-04-01 03:10:38a5d309ac1e8e668e607c9aa42348f9ben/aAdwind216.38.2.208:1050
2020-04-01 03:10:38a5d309ac1e8e668e607c9aa42348f9ben/aAdwind216.38.2.208:1050

# of entries: 6 (max: 100)