URLhaus Database

You are currently viewing the URLhaus database entry for http://143.20.185.102/windyluvexecutor/executor.sh4 which is being or has been used to serve malware. Please consider that URLhaus does not differentiate between websites that have been compromised by hackers and such that has been setup by cybercriminals for the sole purpose of serving malware.

Database Entry


ID:3688227
URL: http://143.20.185.102/windyluvexecutor/executor.sh4
URL Status:flame Online (spreading malware for 24 days, 17 hours, 45 minutes)
Host: 143.20.185.102
Date added:2025-10-26 22:41:11 UTC
Threat:Malware download Malware download
Reporter: botnetkiller
Abuse complaint sent (?): Yes (2025-10-26 22:42:12 UTC to report{at}abuseradar[dot]com)
Tags:DEU elf geofenced mirai link SuperH ua-wget USA

Payload delivery


The table below documents all payloads that URLhaus retrieved from this particular URL.

FirstseenFilenameFile TypePayload (SHA256)VTBazaarSignature
2025-11-20n/aelf 5efa323d5dc172d041fdfb22b20c2c7dad752496612664c92b91713dc87a40ccn/aMirai
2025-11-20n/aelf 1602bbdc164e747ae8a3be38f0d5006e4106ea3d0f6d475853b4d863f30c2886n/aMirai
2025-11-15n/aelf 8b72d37d2e563142a0bcafc4b1e4cd7a9b1e4f97fd906e799b4a4bf8d9c250e6n/aMirai
2025-11-11n/aelf dce04ef4dd7d2fbeb200859b0142de5f52cc44fb6d975d21d16db0b948105b16Virustotal results 56.25%Mirai
2025-11-08n/aelf 856a3ed9efcecdeac7bb992631ec6974a59e4071704bbb975fc4a1f95b70d4a7Virustotal results 55.56%Mirai
2025-10-26n/aelf 96cb26a2cf6b7b9c23b5590a816dd566e6e6bfb81aa5c77ef31f0573de248b21n/aMirai