{"id":1975,"date":"2024-09-25T09:57:03","date_gmt":"2024-09-25T09:57:03","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1975"},"modified":"2025-07-29T03:09:48","modified_gmt":"2025-07-29T03:09:48","slug":"analysis-of-jar-adwind-campaign","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-jar-adwind-campaign\/","title":{"rendered":"Analysis of JAR Adwind Campaign"},"content":{"rendered":"\n<p>Adwind RAT (Remote Access Trojan) is a cross-platform, multifunctional remote access program which is distributed through a single malware-as-a-service platform. One of the main features that distinguish the Adwind RAT from other commercial malware is its distribution openly in the form of a paid service, where the \u201ccustomer\u201d pays a fee for using the malicious program. The aliases for Adwind RAT include: Adwind, Alien Spy, JConnectPro, JBifrost, JSocket, UnknownRat &amp; UnReCoM.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Static Analysis<\/strong><\/h3>\n\n\n\n<p><strong>Language Used: Java \/ JDK 1.6x\/1.7x \/ Swing<\/strong><\/p>\n\n\n\n<p><strong>Code base: Frutas Rat (2012-2013)<\/strong><\/p>\n\n\n\n<p><strong>Target OS: Windows, Linux, Mac OS, Android<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"778\" height=\"126\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1_adwindsa1.webp\" alt=\"\" class=\"wp-image-1977\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"481\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2_adwindsa2-1024x481-1.webp\" alt=\"\" class=\"wp-image-1978\"\/><\/figure>\n\n\n\n<p>After 2012, throughout the subsequent rebranding, Adwind maintained control, and the aliases were sold separately, as products although they all share the same code base, that of jFrutas \/ Frutas RAT. This particular RAT played a significant role in attack campaigns against banks, and one of its variants was implicated in Alberto Nisman&#8217;s murder.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Anti-VMWare\/Virtual Box Code<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"331\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3_adwindsa3-1024x331-1.webp\" alt=\"\" class=\"wp-image-1979\"\/><\/figure>\n\n\n\n<p>Although malware can be camouflaged in a variety of ways, testing for the presence of virtual environments reduces the possibility that it will get executed and thereby get detected. Adwind has a good illustration of this evasive behavior using byte code, before engaging in any malicious activity, Adwind code checks the system to see if it is running in a Virtual Box or VMware virtual machine.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Code hints at a Spanish author<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"291\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4_adwindsa4-1024x291-1.webp\" alt=\"\" class=\"wp-image-1980\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"627\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5_adwindsa5-1024x627-1.webp\" alt=\"\" class=\"wp-image-1981\"\/><\/figure>\n\n\n\n<p>Class names, variables, function names declared and used in Java are from Spanish language, Example; Archivo, conectado, herramientas, nombre etcetra.<\/p>\n\n\n\n<p>Translation: Nombre \u2013 Number, Archivo \u2013 Archive, Herramientas &#8211; Tools<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dynamic Analysis<\/strong><\/h3>\n\n\n\n<p><strong>Infection Chain<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"255\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6_adwind_infchain-1024x255-1.webp\" alt=\"\" class=\"wp-image-1982\"\/><\/figure>\n\n\n\n<p>Adwind RAT infects the victim\u2019s machine by initial infection vectors of spam campaign with attachment (EML), and a suspicious URL to download the malware. The attachment is a MS Word document (.DOCX). The threat actor can trick the user to click on the blurred image to view the document\u2019s content. Once the user opens the .img content, using embedded doc to drop the .JAR file in the %temp% folder to start infecting and perform threat actor\u2019s action on objective.<\/p>\n\n\n\n<p><strong>Sample Information<\/strong><\/p>\n\n\n\n<p><strong>SHA256: 978ef2598a67ed3fd18cf7f79a716fa34750f69057626826cab906d3114faa17<\/strong><\/p>\n\n\n\n<p><strong>Category: Remote Access Tool \/ Spyware<\/strong><\/p>\n\n\n\n<p><strong>Threat Name: Adwind RAT<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"237\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7_adwind_sampleinfo-1024x237-1.webp\" alt=\"\" class=\"wp-image-1983\"\/><\/figure>\n\n\n\n<p><strong>Technical Analysis of DOCX<\/strong><\/p>\n\n\n\n<p><strong>Snap 1: Attachment document of [.docx]<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"511\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8_adwind_technicalanalysis1-1-1024x511-1.webp\" alt=\"\" class=\"wp-image-1984\"\/><\/figure>\n\n\n\n<p>Once the user opens the attachment file, we can see there\u2019s a blurred image, resembles some MS Excel work. What do we usually get? Click the enable content\/enable editing to view the actual content of the image. Now, the document displays a blurred image embedded in the .JAR file.<\/p>\n\n\n\n<p><strong>Snap 2: Generation of .JAR file<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"511\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9_adwind_technicalanalysis1-2-1024x511-1.webp\" alt=\"\" class=\"wp-image-1985\"\/><\/figure>\n\n\n\n<p>Once the user clicks on the blurred image, then a pop-up will be generated, it loads the JAR file and requests the user\u2019s permission to open. If you run the malware manually, it will infect your system and even crash it when permissible.<\/p>\n\n\n\n<p><strong>Snap 3: .JAR properties<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"378\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10_adwind_jarproperties-1024x378-1.webp\" alt=\"\" class=\"wp-image-1986\"\/><\/figure>\n\n\n\n<p>JAR files are .zip files that contain a compressed version of .class files, audio files, image files, or directories. The main advantage of JAR files such as lossless data compression, archiving, decompression, and archive unpacking. Not to mention, JAR files (Java code) can be run on any platform, code once and infect multiple operating systems.<\/p>\n\n\n\n<p><strong>Snap 4: Structure of MS Word [DOCX] document<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"450\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11_adwind_structword-1024x450-1.webp\" alt=\"\" class=\"wp-image-1987\"\/><\/figure>\n\n\n\n<p>DOCX files store data in Open XML Document format, which was introduced by Microsoft from MS Word 2007. It replaced the .DOC file format as the standard format for saving documents in MS Word. Unlike DOC files, which store document data in a single binary file, DOCX files save data as separate files and folders in a compressed ZIP package. Within a DOCX file are XML files and three folders: &nbsp;<strong>Word, docProps, and _rels,<\/strong> which store the content, document properties, and relationships between the files. The Open XML format is designed to make document content more open and accessible.<\/p>\n\n\n\n<p>For example, document text is saved in plain text files, and document images are stored as individual image files, such as .JPG or .PNG, within the DOCX file. The included files may also contain page formatting information, authorship data, and document review notes.<\/p>\n\n\n\n<p><strong>&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Snap 5: Embedded DOC file<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"458\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12_adwind_embeddoc-1024x458-1.webp\" alt=\"\" class=\"wp-image-1988\"\/><\/figure>\n\n\n\n<p>DOC files are created to save various documents, including letters, resumes, essays, and invitations. When we create a document in MS Word, we can then choose to save it in either the DOC, or DOCX file format. Adwind JAR then creates a DOC file to store the document&#8217;s contents, which can be closed and opened again for further editing. When you are done editing your DOC file you can print it or save it as another file, such as .PDF document or .DOT (template) document.<\/p>\n\n\n\n<p><strong>Snap 6: Embedded OLE_native files<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"454\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13_adwind_embedole-1024x454-1.webp\" alt=\"\" class=\"wp-image-1989\"\/><\/figure>\n\n\n\n<p><strong>&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Snap 7: Dropped .JAR in %temp%<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"476\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/14_adwind_droppedjar-1024x476-1.webp\" alt=\"\" class=\"wp-image-1990\"\/><\/figure>\n\n\n\n<p>After the completion of step 2 once the user accepts &amp; opens the document content. Then, the .JAR file will be dropped in the %temp% folder.<\/p>\n\n\n\n<p><strong><br>Snap 8: Structure of .JAR file<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"450\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/15_adwind_structjar-1024x450-1.webp\" alt=\"\" class=\"wp-image-1991\"\/><\/figure>\n\n\n\n<p>JAR file is a Java archive (JAR) file used by the Java Runtime Environment (JRE), a framework used for executing Java programs. JAR files may serve as program libraries or as standalone programs that run if the JRE is installed on the computer or mobile device. After 2015-2016, a lot of the cracked versions of Adwind malware being circulated are used by hundreds of threat actors, which means that there are multiple hundreds of command-and-control servers. Some of them are down, some are up, the others are turned on as required by the threat actors.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Once infected, the following process\/functions are carried out by Adwind RAT,<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collecting information about the compromised host.<\/li>\n\n\n\n<li>Creating scheduled tasks (privilege escalation and persistence).<\/li>\n\n\n\n<li>Credentials harvesting.<\/li>\n\n\n\n<li>Taking screenshots, pictures, and recording video &amp; sound from a microphone\/webcam.<\/li>\n\n\n\n<li>Credential dumping (.exe access).<\/li>\n\n\n\n<li>Password stealing (from browser history and cookies).<\/li>\n\n\n\n<li>Steal VPN certificates.<\/li>\n\n\n\n<li>Targeting web banking links (web injects).<\/li>\n\n\n\n<li>Stealing keys of cryptocurrency wallets.<\/li>\n\n\n\n<li>Password brute forcing.<\/li>\n\n\n\n<li>Process injection to conceal the malicious actions.<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>MITRE ATT&amp;CK Mapping for jRAT \/ Adwind RAT<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><td><strong>ID<\/strong><\/td><td><strong>Technique<\/strong><\/td><td><strong>Functionality<\/strong><\/td><\/tr><\/thead><tbody><tr><td>T1123<\/td><td>Audio Capture<\/td><td>jRAT can capture microphone recordings.<\/td><\/tr><tr><td>T1037<\/td><td>Boot or Logon Initialization Scripts: Startup Items<\/td><td>jRAT can list and manage startup entries.<\/td><\/tr><tr><td>T1115<\/td><td>Clipboard Data<\/td><td>jRAT can capture clipboard data.<\/td><\/tr><tr><td>T1059<\/td><td>Command and Scripting Interpreter:&nbsp;Windows Command Shell<\/td><td>jRAT has command line access.<\/td><\/tr><tr><td>&nbsp;<\/td><td>Command and Scripting Interpreter: Visual Basic<\/td><td>jRAT has been distributed as HTA files with VBScript.<\/td><\/tr><tr><td>&nbsp;<\/td><td>Command and Scripting Interpreter: JavaScript<\/td><td>jRAT has been distributed as HTA files with JScript.<\/td><\/tr><tr><td>T1555<\/td><td>Credentials from Password Stores:&nbsp;Credentials from Web Browsers<\/td><td>jRAT can capture passwords from common web browsers such as Internet Explorer, Google Chrome, and Firefox.<\/td><\/tr><tr><td>T1083<\/td><td>File and Directory Discovery<\/td><td>jRAT can browse file systems.<\/td><\/tr><tr><td>T1070<\/td><td>Indicator Removal:&nbsp;File Deletion<\/td><td>jRAT has a function to delete files from the victim\u2019s machine.<\/td><\/tr><tr><td>T1105<\/td><td>Ingress Tool Transfer<\/td><td>jRAT can download and execute files.<\/td><\/tr><tr><td>T1056<\/td><td>Input Capture:&nbsp;Keylogging<\/td><td>jRAT has the capability to log keystrokes from the victim\u2019s machine, both offline and online.<\/td><\/tr><tr><td>T1027<\/td><td>Obfuscated Files or Information<\/td><td>jRAT\u2019s Java payload is encrypted with AES.&nbsp;Additionally, backdoor files are encrypted using DES as a stream cipher. Later variants of&nbsp;jRAT&nbsp;also incorporated AV evasion methods such as Java bytecode obfuscation via the commercial Allatori obfuscation tool.<\/td><\/tr><tr><td>&nbsp;<\/td><td>Software Packing<\/td><td>jRAT&nbsp;payloads have been packed.<\/td><\/tr><tr><td>T1120<\/td><td>Peripheral Device Discovery<\/td><td>jRAT&nbsp;can map UPnP ports.<\/td><\/tr><tr><td>T1057<\/td><td>Process Discovery<\/td><td>jRAT&nbsp;can query and kill system processes.<\/td><\/tr><tr><td>T1090<\/td><td>Proxy<\/td><td>jRAT&nbsp;can serve as a SOCKS proxy server.<\/td><\/tr><tr><td>T1021<\/td><td>Remote Services:&nbsp;Remote Desktop Protocol<\/td><td>jRAT&nbsp;can support RDP control.<\/td><\/tr><tr><td>T1029<\/td><td>Scheduled Transfer<\/td><td>jRAT&nbsp;can be configured to reconnect at certain intervals.<\/td><\/tr><tr><td>T1113<\/td><td>Screen Capture<\/td><td>jRAT&nbsp;has the capability to take screenshots of the victim\u2019s machine.<\/td><\/tr><tr><td>T1518<\/td><td>Software Discovery:&nbsp;Security Software Discovery<\/td><td>jRAT&nbsp;can list security software, such as by using WMIC to identify anti-virus products installed on the victim\u2019s machine and to obtain firewall details.<\/td><\/tr><tr><td>T1082<\/td><td>System Information Discovery<\/td><td>jRAT&nbsp;collects information about the OS (version, build type, install date) as well as system up-time upon receiving a connection from a backdoor.<\/td><\/tr><tr><td>T1016<\/td><td>System Network Configuration Discovery<\/td><td>jRAT&nbsp;can gather victim internal and external IPs.<\/td><\/tr><tr><td>T1049<\/td><td>System Network Connections Discovery<\/td><td>jRAT&nbsp;can list network connections.<\/td><\/tr><tr><td>T1007<\/td><td>System Service Discovery<\/td><td>jRAT&nbsp;can list local services.<\/td><\/tr><tr><td>T1552<\/td><td>Unsecured Credentials:&nbsp;Credentials In Files<\/td><td>jRAT&nbsp;can capture passwords from common chat applications such as MSN Messenger, AOL, Instant Messenger, and and Google Talk.<\/td><\/tr><tr><td>&nbsp;<\/td><td>Unsecured Credentials:&nbsp;Private Keys<\/td><td>jRAT&nbsp;can steal keys for VPNs and cryptocurrency wallets.<\/td><\/tr><tr><td>T1125<\/td><td>Video Capture<\/td><td>jRAT&nbsp;has the capability to capture video from a webcam.<\/td><\/tr><tr><td>T1047<\/td><td>Windows Management Instrumentation<\/td><td>jRAT&nbsp;uses WMIC to identify anti-virus products installed on the victim\u2019s machine and to obtain firewall details.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Indicator of Compromise<\/strong><\/h3>\n\n\n\n<p><strong>Hashes<\/strong><\/p>\n\n\n\n<p>7e4bdf62d3ecd78b3f407f6ec1158678<\/p>\n\n\n\n<p>0a5f34440389ca860235434eea963465<\/p>\n\n\n\n<p>1da18ec639f7ec2a8aad58655d846e23<\/p>\n\n\n\n<p>d7489b47e17630e5594a320b43b201db<\/p>\n\n\n\n<p>da52c24302a03626d2175123b751f466<\/p>\n\n\n\n<p>b766cf6695730b74a107cb73157262b1<\/p>\n\n\n\n<p>919f2d0043f063a90702fb36887699e8<\/p>\n\n\n\n<p>d470d5a428f99818278fb2816a8d03e9<\/p>\n\n\n\n<p>8f5e55fbb1bee93dc5912dcbd0092519<\/p>\n\n\n\n<p>4a97b2d004d72b69aa64f621b5b74775<\/p>\n\n\n\n<p>051b4da1f0079c6f60d6c8eb62b3f586<\/p>\n\n\n\n<p>2020551b5373121053abdbf3eaafa02d<\/p>\n\n\n\n<p>a4da22e269b93148eb9857036b9a072a<\/p>\n\n\n\n<p>876eb4208ef2eec6e9f12b13f764a975<\/p>\n\n\n\n<p>1d77e96974e1e2301ed78cec19e8710b<\/p>\n\n\n\n<p><strong>IP Address \/ Domains<\/strong><\/p>\n\n\n\n<p>212[.]114[.]52[.]236:9932<\/p>\n\n\n\n<p>unks123[.]duckdns[.]org:46865<\/p>\n\n\n\n<p>lay[.]dubya[.]us:8181<\/p>\n\n\n\n<p>fresh[.]ygto[.]com:1010<\/p>\n\n\n\n<p>gwiza1988[.]hopto[.]org:6025<\/p>\n\n\n\n<p>praisesalways[.]ddns[.]net:1010<\/p>\n\n\n\n<p>wawa[.]cleansite[.]us:1010<\/p>\n\n\n\n<p>dlee889.mywire[.]org:5858<\/p>\n\n\n\n<p><strong>URLs Hosting the JAR files<\/strong><\/p>\n\n\n\n<p>hxxp:\/\/haus-pesjak[.]at\/Covid-19Update.jar<\/p>\n\n\n\n<p>hxxps:\/\/digitaltextile[.]com[.]ru\/lk\/Deutsche%20Telekom.jar<\/p>\n\n\n\n<p>hxxps:\/\/digitaltextile[.]com[.]ru\/n\/DHL%20paket.jar<\/p>\n\n\n\n<p>hxxp:\/\/haus-pesjak[.]at\/04-07-20Intuitinvoices.jar<\/p>\n\n\n\n<p>hxxp:\/\/teddyshatsworld[.]pl\/Reylontransport-covid19-statement20.jar<\/p>\n\n\n\n<p>hxxp:\/\/thaivictory[.]co[.]th\/pageconfig\/album\/dir\/5\/order.jar<\/p>\n\n\n\n<p>hxxp:\/\/cherryemoore[.]com\/USPS\/RedeliveryUSPS.jar<\/p>\n\n\n\n<p>hxxps:\/\/feylibertad[.]org\/Amazon-PO20023938.jar<\/p>\n\n\n\n<p>hxxp:\/\/mahalowood[.]com\/USPS\/USPSReschedulerLabel.jar<\/p>\n\n\n\n<p>hxxps:\/\/newsha[.]jsonland[.]ir\/wp-includes\/css\/DHLPaket.jar<\/p>\n\n\n\n<p>hxxps:\/\/www[.]stillval[.]com\/USPS\/RescheduleUSPS.jar<\/p>\n\n\n\n<p>hxxps:\/\/thediscoveryrun[.]com\/UPS\/ShippingInfo.jar<\/p>\n\n\n\n<p>hxxp:\/\/jeddahcrumbly[.]com\/DHLPAKET.jar<\/p>\n\n\n\n<p>hxxp:\/\/dev[.]medialogistics2020[.]ca\/wp-content\/plugins\/ubh\/Quickbooks-INV5066.jar<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adwind RAT (Remote Access Trojan) is a cross-platform, multifunctional remote access program which is distributed through a single malware-as-a-service platform. One of the main features that distinguish the Adwind RAT from other commercial malware is its distribution openly in the form of a paid service, where the &ldquo;customer&rdquo; pays a fee for using the malicious [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1976,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1975","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1975"}],"version-history":[{"count":2,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1975\/revisions"}],"predecessor-version":[{"id":4175,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1975\/revisions\/4175"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1976"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}