{"id":2872,"date":"2024-09-25T20:20:53","date_gmt":"2024-09-25T20:20:53","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2872"},"modified":"2025-07-29T06:44:07","modified_gmt":"2025-07-29T06:44:07","slug":"blouiroet-malware-masquerading-as-a-miner","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/blouiroet-malware-masquerading-as-a-miner\/","title":{"rendered":"Blouiroet malware masquerading as a miner"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"478\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Miner_in_a_gallery_Potosi_pixinn.net_.webp\" alt=\"\" class=\"wp-image-2902\"\/><\/figure>\n<\/div>\n\n\n<p><strong>Overview&nbsp;<\/strong><\/p>\n\n\n\n<p>With cryptocurrency taking the world by storm, it\u2019s no surprise hackers have found a way to exploit the frenzy. Blouiroet, a trojan with the ability to establish remote access connections, keylog, collect system information, download\/upload files, and drop further malware on the infected system, is being sold on the dark web disguised as a crypto-miner.&nbsp;<\/p>\n\n\n\n<p>To be clear, a phishing URL (highlighted in the dark web advertisement below) is being sold to attackers who then craft an email purporting to offer access to cryptomining software. This is then distributed via a spam email campaign \u2013 in Blouiroet\u2019s case, it has been used to target victims in the U.S, France and China. &nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"736\" height=\"849\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-52.webp\" alt=\"\" class=\"wp-image-2882\"\/><\/figure>\n\n\n\n<p>The following Operating Systems are vulnerable to Blouiroet:<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows 2000<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows 95<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows 98<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows Me<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows NT<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows Server 2003<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows XP<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows Vista<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows 7 (x86\/x64)<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows 8 (x86\/x64)<br><br>\u2022&nbsp;&nbsp; &nbsp;Windows 10 (x86\/x64)<\/p>\n\n\n\n<p><strong>File Details&nbsp;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>File type<\/strong><\/td><td>Portable Executable (PE) file<\/td><\/tr><tr><td><strong>Md5 hash<\/strong><\/td><td>905a5167b248647ce31d57d241aacd63<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis<\/strong><\/p>\n\n\n\n<p>Static analysis quickly uncovered the file\u2019s malicious behavior. Strings were discovered showing the malware searching for various files, checking path names of %TEMP% directory, setting file attributes where the malware was present, and executing command line. Once the fake cryptominer link is clicked, an installation procedure executes. The installation process is designed to fail, with the error message containing a link \u2018for more information\u2019. This link takes the victim directly to Blouiroet\u2019s Command and Control (C&amp;C) server [H**p: \/\/nsis [.]Sf [.]Net\/NSIS_Error].&nbsp;<\/p>\n\n\n\n<p>The below images illustrate the malicious string associated:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"861\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-50-1024x861.webp\" alt=\"\" class=\"wp-image-2883\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"606\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-49-1024x606.webp\" alt=\"\" class=\"wp-image-2884\"\/><\/figure>\n\n\n\n<p>Below process describes the flow of malicious code which gathers victim system and file attributes and function calls.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"907\" height=\"661\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-50.webp\" alt=\"\" class=\"wp-image-2885\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"530\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-47.webp\" alt=\"\" class=\"wp-image-2886\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"370\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-44.webp\" alt=\"\" class=\"wp-image-2887\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-42-1024x576.webp\" alt=\"\" class=\"wp-image-2888\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"467\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-38-1024x467.webp\" alt=\"\" class=\"wp-image-2889\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-34-1024x579.webp\" alt=\"\" class=\"wp-image-2890\"\/><\/figure>\n\n\n\n<p>Further analysis on the C&amp;C uncovered it was created in Russia in September last year:&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"601\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-33.webp\" alt=\"\" class=\"wp-image-2891\"\/><\/figure>\n\n\n\n<p><strong><br><br>Dynamic Analysis<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Upon executing the sample in a dedicated malware analysis environment, we saw a chain of processes being initiated as shown below, namely acdsee.exe, cmd.exe, wscript.exe, cmd.exe rundll.exe, cmd.exe, and ss.exe:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"315\" height=\"175\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-24.webp\" alt=\"\" class=\"wp-image-2892\"\/><\/figure>\n\n\n\n<p>\u201css.exe\u201d, which has been dropped under \u201cC:\\ProgramData\\Rundll\u201d, establishes persistent communication with \u201cTCP 192.168.220.136\/16 445 100 \/save\u201d:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"335\" height=\"393\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-19.webp\" alt=\"\" class=\"wp-image-2893\"\/><\/figure>\n\n\n\n<p>Next, \u201ccmd.exe\u201d (which is running as a non-existent process) starts and communicates with \u201c192.168.220.136\u201d:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"261\" height=\"240\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13-16.webp\" alt=\"\" class=\"wp-image-2894\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"243\" height=\"221\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/14-13.webp\" alt=\"\" class=\"wp-image-2895\"\/><\/figure>\n\n\n\n<p>Ultimately, \u201ccmd.exe\u201d, \u201crundll.exe\u201d, \u201ccmd.exe\u201d, and \u201css.exe\u201d are left running with communications towards the IP addresses \u201c192.168.61.40\u201d and \u201c192.168.61.41\u201d:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"809\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/15-10-1024x809.webp\" alt=\"\" class=\"wp-image-2896\"\/><\/figure>\n\n\n\n<p>After some time, an error message (as mentioned in the static analysis) appears, pointing to the C&amp;C,<strong> \u201ch**p: \/\/nsis [.]Sf [.]Net\/NSIS_Error\u201d<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"459\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/16e.webp\" alt=\"\" class=\"wp-image-2897\"\/><\/figure>\n\n\n\n<p>A number of files were then dropped on to the system, some of which we\u2019ll explore in further detail below:<\/p>\n\n\n\n<p>\u201cAutoCloseExe.txt\u201d was found present under \u201cC:\\Windows\\HhSm\u201d.&nbsp;<\/p>\n\n\n\n<p>This file had all the details on which processes were executed in the victim&#8217;s machine:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"530\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/17-8.webp\" alt=\"\" class=\"wp-image-2898\"\/><\/figure>\n\n\n\n<p>\u201cBlocproc.txt\u201d included details on all the software installed on the machine:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"665\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/18-6-1024x665.webp\" alt=\"\" class=\"wp-image-2899\"\/><\/figure>\n\n\n\n<p>\u201c1.bat\u201d was present which we found querying the system registry, performing condition for error checks, and then creating a Startup entry to maintain persistence:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"753\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/19-5-1024x753.webp\" alt=\"\" class=\"wp-image-2900\"\/><\/figure>\n\n\n\n<p>Another .bat file, &#8220;autoran.bat&#8221;, was responsible for checking file attributes and executing a \u201cstart.vbs\u201d file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"383\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/20-5.webp\" alt=\"\" class=\"wp-image-2901\"\/><\/figure>\n\n\n\n<p>Additionally, \u201cC:\\WINDOWS\\HhSm\\Client.exe\u201d \u2013 a registry-value created file \u2013 &nbsp;establishes a connection with Russian Federation BOT IP address \u201c92.53.96.179\u201d with the domain name: hs-fileserver.info.&nbsp;<\/p>\n\n\n\n<p><strong>Command and Control<\/strong><\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;H**p: \/\/nsis [.]Sf [.]Net\/NSIS_Error<br><br>\u2022&nbsp;&nbsp; &nbsp;Mine[.]zarabotaibitok[.]ru<br><br>\u2022&nbsp;&nbsp; &nbsp;IP Address: 92.53.96.179<\/p>\n\n\n\n<p><strong>Indicators of Compromise&nbsp;<\/strong><br><br>MD5 Hash values of the dropped files:<br><br>\u2022&nbsp;&nbsp; &nbsp;6fa7482b165dc6689350d22c555de51f<br><br>\u2022&nbsp;&nbsp; &nbsp;63af4ca31a0d3f4729a6968564b232ea<br><br>\u2022&nbsp;&nbsp; &nbsp;293f75563f7fa64d1de6945aee4299f0<br><br>\u2022&nbsp;&nbsp; &nbsp;31d696f93ec84e635c4560034340e171<br><br>\u2022&nbsp;&nbsp; &nbsp;770d0caa24d964ea7c04ff5daf290f08<br><br>\u2022&nbsp;&nbsp; &nbsp;25313a0ad4154972b5770260ad594ed0<br><br>\u2022&nbsp;&nbsp; &nbsp;ee2d6e1d976a3a92fb1c2524278922ae<br><br>\u2022&nbsp;&nbsp; &nbsp;a539d27f33ef16e52430d3d2e92e9d5c<br><br>\u2022&nbsp;&nbsp; &nbsp;3c2fe2dbdf09cfa869344fdb53307cb2<br><br>\u2022&nbsp;&nbsp; &nbsp;f82fa69bfe0522163eb0cf8365497da2<br><br>\u2022&nbsp;&nbsp; &nbsp;1ca9e6eb86036daea4dfa3297f70d542<br><br>\u2022&nbsp;&nbsp; &nbsp;a05c7011ab464e6c353a057973f5a06e<br><br>\u2022&nbsp;&nbsp; &nbsp;c24315b0585b852110977dacafe6c8c1<br><br>\u2022&nbsp;&nbsp; &nbsp;a4e439ad454a379db68ab5b2c44a82aa<br><br>\u2022&nbsp;&nbsp; &nbsp;a4e439ad454a379db68ab5b2c44a82aa<br><br>\u2022&nbsp;&nbsp; &nbsp;d9b5b26f0423230e99768092f17919a3<br><br>\u2022&nbsp;&nbsp; &nbsp;3e5d06dc6e7890e1800cf24c9f599856<br><br>\u2022&nbsp;&nbsp; &nbsp;4ff94c163565a38a27cf997ad07b3d69<br><br>\u2022&nbsp;&nbsp; &nbsp;1f0669f13dc0545917e8397063f806db<br><br>\u2022&nbsp;&nbsp; &nbsp;47106682e18b0c53881252061ffcaa2d<br><br>\u2022&nbsp;&nbsp; &nbsp;24aa99837d14bee5da2e2339b07f9d4c<br><br>\u2022&nbsp;&nbsp; &nbsp;89b7dac7d9ce5b75b08f5d037edd3869<br><br>\u2022&nbsp;&nbsp; &nbsp;8c80dd97c37525927c1e549cb59bcbf3<br><br>\u2022&nbsp;&nbsp; &nbsp;756b6353239874d64291e399584ac9e5<br><br>\u2022&nbsp;&nbsp; &nbsp;a6c04fca267b7b6a75dc59d6f50bd968<br><br>\u2022&nbsp;&nbsp; &nbsp;a6c04fca267b7b6a75dc59d6f50bd968<br><br>\u2022&nbsp;&nbsp; &nbsp;ba629216db6cf7c0c720054b0c9a13f3<br><br>\u2022&nbsp;&nbsp; &nbsp;649b368c52de83e52474a20ce4f83425<br><br>\u2022&nbsp;&nbsp; &nbsp;4803a7863da607333378b773b6a17f4c<br><br>\u2022&nbsp;&nbsp; &nbsp;43aac72a9602ef53c5769f04e1be7386<br><br>\u2022&nbsp;&nbsp; &nbsp;f01f09fe90d0f810c44dce4e94785227<br><br>\u2022&nbsp;&nbsp; &nbsp;5adcbe8bbba0f6e733550ce8a9762fa0<br><br>\u2022&nbsp;&nbsp; &nbsp;9a5cec05e9c158cbc51cdc972693363d<br><br>\u2022&nbsp;&nbsp; &nbsp;6fe4544d00b77e0295e779e82d8f0fe5<br><br>\u2022&nbsp;&nbsp; &nbsp;00dd6b018c3c2d347df43f779715bca5<br><br>\u2022&nbsp;&nbsp; &nbsp;09836461312a3781af6e1298c6b2c249<br><br>\u2022&nbsp;&nbsp; &nbsp;30017e300c6d92e126bf92017c195c37<br><br>\u2022&nbsp;&nbsp; &nbsp;2f0a52ce4f445c6e656ecebbcaceade5<br><br>\u2022&nbsp;&nbsp; &nbsp;b777086fd83d0bc1dccdc7c126b207d0<br><br>\u2022&nbsp;&nbsp; &nbsp;8969668746ae64ca002cc7289cd1c5da<br><br>\u2022&nbsp;&nbsp; &nbsp;e53f9e6f1916103aab8703160ad130c0<br><br>\u2022&nbsp;&nbsp; &nbsp;9b80804a00bb6fa7f298d15c0947b2af<br><br>\u2022&nbsp;&nbsp; &nbsp;c5fe643c7b2fb4a5e8f23411c561bb77<br><br>\u2022&nbsp;&nbsp; &nbsp;c097fd043d3cbabcada0878505c7afa5<br><br>\u2022&nbsp;&nbsp; &nbsp;5e8ecdc3e70e2ecb0893cbda2c18906f<br><br>\u2022&nbsp;&nbsp; &nbsp;15191883753d0b230c4e89158261d4ac<br><br>\u2022&nbsp;&nbsp; &nbsp;0647dcd31c77d1ee6f8fac285104771a<br><br>\u2022&nbsp;&nbsp; &nbsp;f0881d5a7f75389deba3eff3f4df09ac<br><br>\u2022&nbsp;&nbsp; &nbsp;f61e81eaf4a9ac9cd52010da3954c2a9<br><br>\u2022&nbsp;&nbsp; &nbsp;8b0a4ce79f5ecdb17ad168e35db0d0f9<br><br>\u2022&nbsp;&nbsp; &nbsp;838ceb02081ac27de43da56bec20fc76<br><br>\u2022&nbsp;&nbsp; &nbsp;01d5adbfee39c5807ee46f7990f5fda7<br><br>\u2022&nbsp;&nbsp; &nbsp;46f7b320b13a4b618946042360215179<br><br>\u2022&nbsp;&nbsp; &nbsp;3e89c56056e5525bf4d9e52b28fbbca7<br><br>\u2022&nbsp;&nbsp; &nbsp;d1aae806243cc0bedb83a22919a3a660<br><br>\u2022&nbsp;&nbsp; &nbsp;83076104ae977d850d1e015704e5730a<br><br>\u2022&nbsp;&nbsp; &nbsp;1fa609bc0d252ca0915d6aed2df7ccc2<br><br>\u2022&nbsp;&nbsp; &nbsp;6b7276e4aa7a1e50735d2f6923b40de4<br><br>\u2022&nbsp;&nbsp; &nbsp;e4a7755973b32e44e4ec60beeb7809fe<br><br>\u2022&nbsp;&nbsp; &nbsp;d8d6f3a3e75da9887c165781d5b31e31<br><br>\u2022&nbsp;&nbsp; &nbsp;66e0ee9a617f88f1a173ea2f0c585368<br><br>\u2022&nbsp;&nbsp; &nbsp;5b72ccfa122e403919a613785779af49<br><br>\u2022&nbsp;&nbsp; &nbsp;9744f0000284c2807de0651c7e0d980a<br><br>\u2022&nbsp;&nbsp; &nbsp;e4ad4df4e41240587b4fe8bbcb32db15<\/p>\n\n\n\n<p><strong>Domains<\/strong><\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp; &nbsp;H**p: \/\/nsis [.]Sf [.]Net\/NSIS_Error<br><br>\u2022&nbsp;&nbsp; &nbsp;Mine[.]zarabotaibitok[.]ru<\/p>\n\n\n\n<p><strong>Registry Value Created<\/strong><\/p>\n\n\n\n<p>HKLM\\SYSTEM\\CurrentControlSet\\Services\\AdobeFlashPlayerHash\\ImagePath: &#8220;C:\\WINDOWS\\HhSm\\Client.exe&#8221;<\/p>\n\n\n\n<p><strong>Mitigation and Countermeasures<\/strong><br><br>While there are no specific countermeasures for Blouiroet, beyond using the IOCs listed above, below are the best practice steps one should take to minimise their exposure to such malware:<br><br>\u2022&nbsp;&nbsp; &nbsp;Update antivirus to the latest signatures<br><br>\u2022&nbsp;&nbsp; &nbsp;Exercise caution while clicking on email attachments&nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;Use strong passwords for data protection<br><br>\u2022&nbsp;&nbsp; &nbsp;Make sure that systems are patched\/updated with the latest softwar<br><br>&nbsp;<\/p>\n\n\n\n<p>On 2018-07-11<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview&nbsp; With cryptocurrency taking the world by storm, it&rsquo;s no surprise hackers have found a way to exploit the frenzy. Blouiroet, a trojan with the ability to establish remote access connections, keylog, collect system information, download\/upload files, and drop further malware on the infected system, is being sold on the dark web disguised as a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2902,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2872"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2872\/revisions"}],"predecessor-version":[{"id":4337,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2872\/revisions\/4337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2902"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}