URLhaus Database

You are currently viewing the URLhaus database entry for http://143.20.185.102/windyluvexecutor/executor.m68k which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3688221
URL: http://143.20.185.102/windyluvexecutor/executor.m68k
URL Status:flame Online (spreading malware for 24 days, 17 hours, 45 minutes)
Host: 143.20.185.102
Date added:2025-10-26 22:41:10 UTC
Threat:Malware download Malware download
Reporter: botnetkiller
Abuse complaint sent (?): Yes (2025-10-26 22:42:12 UTC to report{at}abuseradar[dot]com)
Tags:elf geofenced m68k mirai link ua-wget USA

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2025-11-20n/aelf c66282302715412cc56e194efcc408c9919ee3035fd01a934044767bfcc76499n/aMirai
2025-11-15n/aelf 8dc34fdd0f9b236af5d88c1d4e8fb06381488dc70903f16c106d5393da816f14n/aMirai
2025-11-11n/aelf 3c925e85673e981deec051f39ffead5b787115dd89feb891fc27167c9263bd80Virustotal results 56.25%Mirai
2025-11-08n/aelf 91a68eefaa829c4b6c705372d28bc4fc848eec85efa66e08348e7995321d7d53n/aMirai
2025-10-26n/aelf 19a3bb38caea6b2d896a63e416a70b680311cd77373aed43c92701c1a9cc88e8n/aMirai