URLhaus Database

You are currently viewing the URLhaus database entry for http://143.20.185.102/windyluvexecutor/executor.mips which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3688217
URL: http://143.20.185.102/windyluvexecutor/executor.mips
URL Status:flame Online (spreading malware for 24 days, 17 hours, 44 minutes)
Host: 143.20.185.102
Date added:2025-10-26 22:41:10 UTC
Threat:Malware download Malware download
Reporter: botnetkiller
Abuse complaint sent (?): Yes (2025-10-26 22:42:12 UTC to report{at}abuseradar[dot]com)
Tags:elf geofenced mips mirai link ua-wget USA

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2025-11-20executor.mipself 111529e1e2f58e7cfc8a36101ddc560a2671910e4a40e665e34d1721e085190cn/aMirai
2025-11-15executor.mipself dc64c12b0ec473e915c9d177dd4731f88e8d3d50e6eb0c5dbd2f5d37c9a4da35n/aMirai
2025-11-11executor.mipself 2f012432d079c2c6b0fe05f21eade8aa1ceee91d1ecaa01bb5cf5145e993c857Virustotal results 39.68%Mirai
2025-11-08executor.mipself aa2dc23179e65cdaa4557d9481025096df545e6b0cc9ffbcdd19868d1c679ecan/aMirai
2025-10-26executor.mipself 74317e2234442fe77c683c97902cb94a78f89061d18c67cc93573794d30acf9bn/aMirai