SSL Certificates
The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint feb7eaa2f2f2b44a9afd1eefcae19e350e443953.
Database Entry
| SHA1 Fingerprint: | feb7eaa2f2f2b44a9afd1eefcae19e350e443953 |
|---|---|
| Certificate Common Name (CN): | 49.13.39.105 |
| Issuer Distinguished Name (DN): | 49.13.39.105 |
| TLS Version: | TLS 1.2 |
| First seen: | 2026-01-17 13:51:43 UTC |
| Last seen: | 2026-01-20 16:59:54 UTC |
| Status: | Blacklisted |
| Listing reason: | Vidar C&C |
| Listing date: | 2026-02-04 09:19:41 |
| Malware samples: | 6 |
| Botnet C&Cs: | 1 |
Malware Samples
The table below documents all malware samples associated with this SSL certificate.
| Timestamp (UTC) | Malware Sample (MD5 hash) | VT | Signature | Botnet C&C (IP:port) |
|---|---|---|---|---|
| 2026-01-20 16:59:54 | ef4d7c1bba20390c4c5eac450493da38 | n/a | 49.13.39.105:443 | |
| 2026-01-18 15:33:33 | 1c5feb7254f83c275e1fc20b0ca123bf | n/a | 49.13.39.105:443 | |
| 2026-01-18 15:23:37 | c982b69f470fddcdcf0e5583d7837433 | n/a | 49.13.39.105:443 | |
| 2026-01-17 22:24:37 | bc0795dea7aaee035369edd9b6bce716 | n/a | 49.13.39.105:443 | |
| 2026-01-17 13:59:01 | 3183d5776a6f82d46bf8bcfb91d72a4c | n/a | 49.13.39.105:443 | |
| 2026-01-17 13:51:43 | 42ce8894a0628de66d81c10563c03592 | n/a | 49.13.39.105:443 |
# of entries: 6 (max: 100)