URLhaus Database

You are currently viewing the URLhaus database entry for http://143.20.185.102/windyluvexecutor/executor.x86_64 which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3688222
URL: http://143.20.185.102/windyluvexecutor/executor.x86_64
URL Status:flame Online (spreading malware for 24 days, 17 hours, 45 minutes)
Host: 143.20.185.102
Date added:2025-10-26 22:41:10 UTC
Threat:Malware download Malware download
Reporter: botnetkiller
Abuse complaint sent (?): Yes (2025-10-26 22:42:12 UTC to report{at}abuseradar[dot]com)
Tags:elf geofenced mirai link ua-wget USA x86

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2025-11-20n/aelf f8bdc93594da9fd1511bb71d9c879e08f83d7654809cb42aa6da838d67c5095fn/aMirai
2025-11-19n/aelf 3d7a2213500cc16e9b8ae1ac0077688ad736c7b99308b4d9727b98429e12453an/a
2025-11-15n/aelf 03796d3a2d2ab7dbd786648e5d972f5a8456bb61cc635f34797dd7d63d95126bn/aMirai
2025-11-11n/aelf ebff9762f6a70510dc6c7e04023b9094e231ac4aa9ba382130928cc5b09414e2n/aMirai
2025-11-08n/aelf 68e2a2e74bf15a8d23771a202f1f910aa2f9381eff93f4819c22ab859ddb8388n/aMirai
2025-10-26n/aelf c10112561683550e5df5ef9f910b2a63f0e674559dbed260be732c3b828b863en/aMirai