URLhaus Database

You are currently viewing the URLhaus database entry for http://143.20.185.102/windyluvexecutor/executor.arm which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3688214
URL: http://143.20.185.102/windyluvexecutor/executor.arm
URL Status:flame Online (spreading malware for 24 days, 17 hours, 45 minutes)
Host: 143.20.185.102
Date added:2025-10-26 22:41:10 UTC
Threat:Malware download Malware download
Reporter: botnetkiller
Abuse complaint sent (?): Yes (2025-10-26 22:42:12 UTC to report{at}abuseradar[dot]com)
Tags:arm DEU elf geofenced mirai link ua-wget USA

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2025-11-20executor.armelf 5e94bf35eb2cf31f491f26f3b83827c0dace3156bbc2e8aed5600c2d7cf86e1fn/aMirai
2025-11-20executor.armelf 6e7760922bdc2b1ce5bc142a226f6ea098185e53ae57538f9297a5386a441bban/aMirai
2025-11-16executor.armelf bac5d8c3e9b94bae1a46746647843b0432cad631c81ce78a0119c3528c2fd9a3Virustotal results 29.69%Mirai
2025-11-11executor.armelf ed93fb3ceb8e3a5dec1e2bb1ab111b9b5ca8d86423ca8e42d6fe52bbb8d108a7Virustotal results 28.12%Mirai
2025-11-08executor.armelf 741df6649360fa73c4fa54dcd8cef092d7427174ad92a7d706a41828a676c758n/aMirai
2025-10-26executor.armelf 5975354a366d40c615b06951a7df659261c67c7d9999f8355b8235d996e65f5fn/aMirai