URLhaus Database

You are currently viewing the URLhaus database entry for http://143.20.185.102/windyluvexecutor/executor.mpsl which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3688215
URL: http://143.20.185.102/windyluvexecutor/executor.mpsl
URL Status:flame Online (spreading malware for 24 days, 17 hours, 45 minutes)
Host: 143.20.185.102
Date added:2025-10-26 22:41:10 UTC
Threat:Malware download Malware download
Reporter: botnetkiller
Abuse complaint sent (?): Yes (2025-10-26 22:42:12 UTC to report{at}abuseradar[dot]com)
Tags:elf geofenced mips mirai link ua-wget USA

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2025-11-20executor.mpslelf 98621f6033370195f0ca71350e5b5a90843490bd94b10f88b2e2cd2c40d6029bn/aMirai
2025-11-15executor.mpslelf c0e9a142c33347f399bfdf1069309e9a8eed39e79ee22e494ffd58af2631abc8n/aMirai
2025-11-11executor.mpslelf de3bce9f1f5718021bbf4622a3714326b3dde255beaff59d31f56050544f4168Virustotal results 43.75%Mirai
2025-11-08executor.mpslelf fa1071beaf4b614e478fbf2844375faf8315b5c58c118681e3d3952aaffe5990n/aMirai
2025-10-26executor.mpslelf 4bdcdfad552fffa00108f056a4940230ac3e5b8457f84fdc8d593edda264ca53n/aMirai