{
  "type": "URL",
  "indicator": "https://htbyb.com/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://htbyb.com/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4170592158,
      "indicator": "https://htbyb.com/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 1,
      "pulses": [
        {
          "id": "6951f52a5af00a9be445ad41",
          "name": "Mirai - HoneyPot | Pegasus  | Therahand HoneyPot Bot Network",
          "description": "A HoneyPot Bot Network created to protect a criminal who worked for a company formerly known as Therahand Wellness. This company employed an unquestioned but admittedly guilty SA\u2019r. | Name tactics used in an attempt to draw in victims to leave truthful negative reviews about Jeffrey Reimer | The website is extremely malicious. NSO Pegasus & Palantir relationship.\n\nWhat a pity there is no work done in the state of Colorado to convict medical unprofessionals unless they are poor assistants , Latin, African American or , Native. | Colorado has a known race issue. \n\nColorado ranks poor for getting rape kits tested.\nPoor possibly outranking Baltimore,MD in police brutality. \nPoor at solving it attempting to solve crimes. Law enforcement literally collects paper, evidence and turns evidence away at times. \n\nThis system allows the actual criminal\nto track victim.\nIf he wants to be the victim of this crime against persons let him be. \n\n *Pegasus & Israel and 99% of all tags auto populated by OTX.",
          "modified": "2026-01-28T02:03:16.337000",
          "created": "2025-12-29T03:27:38.183000",
          "tags": [
            "no expiration",
            "expiration",
            "url http",
            "url https",
            "iocs",
            "enter source",
            "url or",
            "name servers",
            "a domains",
            "accept encoding",
            "urls",
            "emails",
            "servers",
            "url add",
            "http",
            "files domain",
            "files related",
            "related tags",
            "united",
            "gmt contenttype",
            "ipv4 add",
            "url analysis",
            "files",
            "present dec",
            "cname",
            "virtool",
            "cryp",
            "ip address",
            "trojan",
            "win32",
            "therahand",
            "jeffrey reimer",
            "reimer  dpt",
            "msie",
            "chrome",
            "unknown ns",
            "unknown cname",
            "record value",
            "accept",
            "encrypt",
            "passive dns",
            "moved",
            "wp engine",
            "meta",
            "wordpress",
            "pegasus",
            "america flag",
            "america asn",
            "reverse dns",
            "flag",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "analysis",
            "tor analysis",
            "dns requests",
            "united states",
            "hostname",
            "pulse submit",
            "domain",
            "files ip",
            "eva lisa",
            "eva reimer",
            "all ipv4",
            "dynamic_content",
            "fingerprinting",
            "size",
            "pattern match",
            "mitre att",
            "ck id",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "status",
            "hostname add",
            "evasion",
            "proximity",
            "pulse pulses",
            "address",
            "learn",
            "adversaries",
            "name tactics",
            "suspicious",
            "informative",
            "defense evasion",
            "command",
            "initial access",
            "spawns",
            "present mar",
            "present jun",
            "title",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "data recovery",
            "ms windows",
            "process32nextw",
            "intel",
            "pe32",
            "format",
            "mozilla",
            "installcapital",
            "generic",
            "write",
            "unknown",
            "malware",
            "next",
            "installer",
            "template",
            "div div",
            "request blocked",
            "helvetica neue",
            "helvetica segoe",
            "ui arial",
            "script script",
            "pragma",
            "port",
            "destination",
            "binbusybox",
            "high",
            "post",
            "icmp traffic",
            "dns query",
            "newstatusurl",
            "mirai",
            "prefetch8",
            "ck matrix",
            "localappdata",
            "info",
            "ssl certificate",
            "czech republic",
            "prefetch1",
            "prefetch2",
            "israel israel",
            "analysis tip",
            "href",
            "ascii text",
            "null",
            "refresh",
            "span",
            "iframe",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "t1480 execution",
            "beginstring",
            "windir",
            "openurl c",
            "programfiles",
            "related nids",
            "files location",
            "flag united",
            "dynamicloader",
            "medium",
            "named pipe",
            "win64",
            "download",
            "delphi",
            "smartassembly",
            "m. brian sabey",
            "quasi government",
            "no such agency",
            "facebook",
            "search",
            "date",
            "showing",
            "ukraine",
            "\u2018buzz\u2019",
            "alex karp",
            "peter theil",
            "elon musk",
            "ff d5",
            "yara rule",
            "ee fc",
            "generic http",
            "exe upload",
            "f0 ff",
            "eb e1",
            "ff bb",
            "show process",
            "sha1",
            "sub domain",
            "show technique",
            "network traffic",
            "class",
            "starfield",
            "cyber crime",
            "yara detections",
            "top source",
            "top destination",
            "source source",
            "filehash",
            "sha256 add",
            "av detections",
            "ids detections",
            "alerts",
            "show",
            "dock",
            "execution",
            "present feb",
            "value",
            "content type",
            "mirai",
            "sha256",
            "body",
            "gmt content",
            "ddos",
            "mtb sep",
            "hosting",
            "domain robot",
            "expiration date",
            "welcome",
            "apple",
            "christopher p. ahmann",
            "tsara",
            "monitored target",
            "github https",
            "github",
            "smart assembly",
            "red hat",
            "hackers",
            "google"
          ],
          "references": [
            "https://therahand.com",
            "www.socialimages.reputationdatabase.com",
            "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
            "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
            "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
            "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
            "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
            "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
            "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
            "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
            "BinBusyBox: 0x.un5t48l3.host",
            "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
            "AS24961 MyLoc Managed IT AG",
            "PSI | Planned Systems International https://www.plan-sys.com/cyber",
            "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
            "https://www.red-gate.com/products/smartassembly",
            "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
            "Colorado maintains a public-facing police misconduct database via the state's",
            "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
            "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!"
          ],
          "public": 1,
          "adversary": "NSO Pegasus",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "FakeAV.FOR",
              "display_name": "FakeAV.FOR",
              "target": null
            },
            {
              "id": "Win32:MalOb-DB\\ [Cryp]",
              "display_name": "Win32:MalOb-DB\\ [Cryp]",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-306281",
              "display_name": "Win.Trojan.Agent-306281",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator.KI",
              "display_name": "VirTool:Win32/Obfuscator.KI",
              "target": "/malware/VirTool:Win32/Obfuscator.KI"
            },
            {
              "id": "Win32:MalOb-DB\\ [Cryp]",
              "display_name": "Win32:MalOb-DB\\ [Cryp]",
              "target": null
            },
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "ELF:Gafgyt-DZ\\ [Trj]",
              "display_name": "ELF:Gafgyt-DZ\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-5607483-0",
              "display_name": "Unix.Trojan.Mirai-5607483-0",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            },
            {
              "id": "Pegasus",
              "display_name": "Pegasus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1036.005",
              "name": "Match Legitimate Name or Location",
              "display_name": "T1036.005 - Match Legitimate Name or Location"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 523,
            "FileHash-SHA1": 402,
            "FileHash-SHA256": 2165,
            "URL": 4953,
            "domain": 1118,
            "hostname": 1951,
            "email": 12,
            "SSLCertFingerprint": 52,
            "CVE": 2
          },
          "indicator_count": 11178,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "81 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Colorado maintains a public-facing police misconduct database via the state's",
        "https://www.red-gate.com/products/smartassembly",
        "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
        "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
        "AS24961 MyLoc Managed IT AG",
        "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
        "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
        "https://therahand.com",
        "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
        "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
        "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
        "BinBusyBox: 0x.un5t48l3.host",
        "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
        "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
        "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!",
        "www.socialimages.reputationdatabase.com",
        "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "PSI | Planned Systems International https://www.plan-sys.com/cyber"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "NSO Pegasus"
          ],
          "malware_families": [
            "Virtool:win32/obfuscator.ki",
            "Fakeav.for",
            "Win32:malob-db\\ [cryp]",
            "Elf:gafgyt-dz\\ [trj]",
            "Unix.trojan.mirai-5607483-0",
            "Win.trojan.agent-306281",
            "Mirai",
            "Elf:mirai-gh\\ [trj]",
            "Other malware",
            "Pegasus"
          ],
          "industries": [],
          "unique_indicators": 11538
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/htbyb.com",
    "whois": "http://whois.domaintools.com/htbyb.com",
    "domain": "htbyb.com",
    "hostname": "Unavailable"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 1,
  "pulses": [
    {
      "id": "6951f52a5af00a9be445ad41",
      "name": "Mirai - HoneyPot | Pegasus  | Therahand HoneyPot Bot Network",
      "description": "A HoneyPot Bot Network created to protect a criminal who worked for a company formerly known as Therahand Wellness. This company employed an unquestioned but admittedly guilty SA\u2019r. | Name tactics used in an attempt to draw in victims to leave truthful negative reviews about Jeffrey Reimer | The website is extremely malicious. NSO Pegasus & Palantir relationship.\n\nWhat a pity there is no work done in the state of Colorado to convict medical unprofessionals unless they are poor assistants , Latin, African American or , Native. | Colorado has a known race issue. \n\nColorado ranks poor for getting rape kits tested.\nPoor possibly outranking Baltimore,MD in police brutality. \nPoor at solving it attempting to solve crimes. Law enforcement literally collects paper, evidence and turns evidence away at times. \n\nThis system allows the actual criminal\nto track victim.\nIf he wants to be the victim of this crime against persons let him be. \n\n *Pegasus & Israel and 99% of all tags auto populated by OTX.",
      "modified": "2026-01-28T02:03:16.337000",
      "created": "2025-12-29T03:27:38.183000",
      "tags": [
        "no expiration",
        "expiration",
        "url http",
        "url https",
        "iocs",
        "enter source",
        "url or",
        "name servers",
        "a domains",
        "accept encoding",
        "urls",
        "emails",
        "servers",
        "url add",
        "http",
        "files domain",
        "files related",
        "related tags",
        "united",
        "gmt contenttype",
        "ipv4 add",
        "url analysis",
        "files",
        "present dec",
        "cname",
        "virtool",
        "cryp",
        "ip address",
        "trojan",
        "win32",
        "therahand",
        "jeffrey reimer",
        "reimer  dpt",
        "msie",
        "chrome",
        "unknown ns",
        "unknown cname",
        "record value",
        "accept",
        "encrypt",
        "passive dns",
        "moved",
        "wp engine",
        "meta",
        "wordpress",
        "pegasus",
        "america flag",
        "america asn",
        "reverse dns",
        "flag",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "analysis",
        "tor analysis",
        "dns requests",
        "united states",
        "hostname",
        "pulse submit",
        "domain",
        "files ip",
        "eva lisa",
        "eva reimer",
        "all ipv4",
        "dynamic_content",
        "fingerprinting",
        "size",
        "pattern match",
        "mitre att",
        "ck id",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "status",
        "hostname add",
        "evasion",
        "proximity",
        "pulse pulses",
        "address",
        "learn",
        "adversaries",
        "name tactics",
        "suspicious",
        "informative",
        "defense evasion",
        "command",
        "initial access",
        "spawns",
        "present mar",
        "present jun",
        "title",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "data recovery",
        "ms windows",
        "process32nextw",
        "intel",
        "pe32",
        "format",
        "mozilla",
        "installcapital",
        "generic",
        "write",
        "unknown",
        "malware",
        "next",
        "installer",
        "template",
        "div div",
        "request blocked",
        "helvetica neue",
        "helvetica segoe",
        "ui arial",
        "script script",
        "pragma",
        "port",
        "destination",
        "binbusybox",
        "high",
        "post",
        "icmp traffic",
        "dns query",
        "newstatusurl",
        "mirai",
        "prefetch8",
        "ck matrix",
        "localappdata",
        "info",
        "ssl certificate",
        "czech republic",
        "prefetch1",
        "prefetch2",
        "israel israel",
        "analysis tip",
        "href",
        "ascii text",
        "null",
        "refresh",
        "span",
        "iframe",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "t1480 execution",
        "beginstring",
        "windir",
        "openurl c",
        "programfiles",
        "related nids",
        "files location",
        "flag united",
        "dynamicloader",
        "medium",
        "named pipe",
        "win64",
        "download",
        "delphi",
        "smartassembly",
        "m. brian sabey",
        "quasi government",
        "no such agency",
        "facebook",
        "search",
        "date",
        "showing",
        "ukraine",
        "\u2018buzz\u2019",
        "alex karp",
        "peter theil",
        "elon musk",
        "ff d5",
        "yara rule",
        "ee fc",
        "generic http",
        "exe upload",
        "f0 ff",
        "eb e1",
        "ff bb",
        "show process",
        "sha1",
        "sub domain",
        "show technique",
        "network traffic",
        "class",
        "starfield",
        "cyber crime",
        "yara detections",
        "top source",
        "top destination",
        "source source",
        "filehash",
        "sha256 add",
        "av detections",
        "ids detections",
        "alerts",
        "show",
        "dock",
        "execution",
        "present feb",
        "value",
        "content type",
        "mirai",
        "sha256",
        "body",
        "gmt content",
        "ddos",
        "mtb sep",
        "hosting",
        "domain robot",
        "expiration date",
        "welcome",
        "apple",
        "christopher p. ahmann",
        "tsara",
        "monitored target",
        "github https",
        "github",
        "smart assembly",
        "red hat",
        "hackers",
        "google"
      ],
      "references": [
        "https://therahand.com",
        "www.socialimages.reputationdatabase.com",
        "Mirai: Yara Detections SUSP_ELF_LNX_UPX_Compressed_File , UPX , ELFHighEntropy , ElfUPX , elf_empty_sections",
        "Alerts: dead_host network_icmp nolookup_communication p2p_cnc",
        "Israel : https://tollfreeforwarding.com/virtual-phone-number/israel/360 \u2022 siteassets.parastorage.com",
        "Palantir \u2022 NSO Group \u2022 Meta \u2022 Douglas County Sheriff \u2022 Palantir \u2022 Foundry \u2022 Therahand \u2022 Graphite \u2022 US .Government",
        "Christopher P. \u2018Buzz\u2019 Ahmann \u2022 No Such Agency \u2022 Hall Render Brian Sabey via Therahand",
        "https://hybrid-analysis.com/sample/489b309feb70c5267454229633f4eae3a98112498da2f78b1819ec343d938867/6951ab3dc7cfb38abf021a06",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "https://hybrid-analysis.com/sample/fecd023f35b153f1c71353834588a545d312da5c78ec0bba9bc10d93c3490f5e",
        "BinBusyBox: 0x.un5t48l3.host",
        "ASN: 213.202.211.188\u2022 0x.un5t48l3.host \u2022 srv1354.dedicated.server-hosting.expert Germany",
        "AS24961 MyLoc Managed IT AG",
        "PSI | Planned Systems International https://www.plan-sys.com/cyber",
        "Smart Assembly | https://github.com/red-gate/SmartAssembly-demo",
        "https://www.red-gate.com/products/smartassembly",
        "https://cdphe.colorado.gov/sexual-violence-prevention/sexual-violence-prevention-statistics-resources",
        "Colorado maintains a public-facing police misconduct database via the state's",
        "Peace Officer Standards and Training (POST) Board website, available at post.coag.gov.",
        "Sexual Assault against both Men and Women in the State of Colorado leads the nation. Great work!"
      ],
      "public": 1,
      "adversary": "NSO Pegasus",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "FakeAV.FOR",
          "display_name": "FakeAV.FOR",
          "target": null
        },
        {
          "id": "Win32:MalOb-DB\\ [Cryp]",
          "display_name": "Win32:MalOb-DB\\ [Cryp]",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-306281",
          "display_name": "Win.Trojan.Agent-306281",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator.KI",
          "display_name": "VirTool:Win32/Obfuscator.KI",
          "target": "/malware/VirTool:Win32/Obfuscator.KI"
        },
        {
          "id": "Win32:MalOb-DB\\ [Cryp]",
          "display_name": "Win32:MalOb-DB\\ [Cryp]",
          "target": null
        },
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "ELF:Gafgyt-DZ\\ [Trj]",
          "display_name": "ELF:Gafgyt-DZ\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-5607483-0",
          "display_name": "Unix.Trojan.Mirai-5607483-0",
          "target": null
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        },
        {
          "id": "Pegasus",
          "display_name": "Pegasus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1203",
          "name": "Exploitation for Client Execution",
          "display_name": "T1203 - Exploitation for Client Execution"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1036.005",
          "name": "Match Legitimate Name or Location",
          "display_name": "T1036.005 - Match Legitimate Name or Location"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 523,
        "FileHash-SHA1": 402,
        "FileHash-SHA256": 2165,
        "URL": 4953,
        "domain": 1118,
        "hostname": 1951,
        "email": 12,
        "SSLCertFingerprint": 52,
        "CVE": 2
      },
      "indicator_count": 11178,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "81 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://htbyb.com/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://htbyb.com/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776616659.8387287
}