{"id":2990,"date":"2024-09-25T20:55:45","date_gmt":"2024-09-25T20:55:45","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2990"},"modified":"2025-07-29T06:55:04","modified_gmt":"2025-07-29T06:55:04","slug":"spritecoin-who-needs-phishing-when-crypto-hype-makes-the-perfect-bait","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/spritecoin-who-needs-phishing-when-crypto-hype-makes-the-perfect-bait\/","title":{"rendered":"SpriteCoin: who needs phishing when crypto-hype makes the perfect bait?"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"315\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Victor-Mousetrap.webp\" alt=\"Victor-Mousetrap\" class=\"wp-image-3012\"\/><\/figure>\n<\/div>\n\n\n<p>With the hype around cryptocurrency sending values skyrocketing, it was only a matter of time until cyber criminals pounced. We\u2019re all familiar with attackers demanding payments in cryptocurrency but, in the case of SpriteCoin, hackers seem to have weaponised FOMO (fear of missing out). &nbsp;<br><br>SpriteCoin ransomware takes advantage of the interest in cryptocurrency with authors advertising the supposed coin on forums, claiming it will be the next big thing.&nbsp;<br><br>Users are lured into downloading the currency\u2019s wallet, which is in fact a form of ransomware. A victim believes the wallet is setting up, however all the while their files are being encrypted. &nbsp;<br><br>In this case, the ransom demanded is 0.3 Monero (roughly USD$100) in payment. Adding insult to injury, once this ransom is paid a second piece of malware is dropped on to the victim\u2019s terminal. SpriteCoin not only encrypts files, but also steals user credentials, storing them using an embedded SQLite engine before sending them to the attackers&#8217; Tor website via several POST requests.<\/p>\n\n\n\n<p><strong>File Details&nbsp;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>File type<\/strong><\/td><td>Portable Executable (.exe) file<\/td><\/tr><tr><td><strong>Md5 hash<\/strong><\/td><td>14ea53020b4d0cb5acbea0bf2207f3f6<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis<\/strong><br><br>The first thing we noticed was our sample was developed with UPX packer:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"30\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-10-1-1024x30.webp\" alt=\"\" class=\"wp-image-2993\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-10-1-1024x30.webp 1024w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-10-1.webp 1057w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Once unpacked, we were given a new sample hash:<em><strong> \u201cec917948471862504b19b643eb6e5e1f\u201d<\/strong><\/em><br><br>This ransomware sample has been coded in SQL. Upon unpacking, we discovered that once browser credentials were stolen, they were then queried in SQL:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"781\" height=\"460\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-11-1.webp\" alt=\"\" class=\"wp-image-2994\"\/><\/figure>\n\n\n\n<p>Mutex creation features are used to avoid repeated infection, check for free disk space, get file attributes, process addresses, and access the &#8220;%TEMP%&#8221; path:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"717\" height=\"570\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-10-1.webp\" alt=\"\" class=\"wp-image-2995\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"847\" height=\"438\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-9-1.webp\" alt=\"\" class=\"wp-image-2996\"\/><\/figure>\n\n\n\n<p>SpriteCoin also conducts &#8220;GET&#8221; and &#8220;POST&#8221; requests to various onion sites, checking target user profile details like computer name and user account name:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"415\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-7-1.webp\" alt=\"\" class=\"wp-image-2997\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"507\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-8-1-1024x507.webp\" alt=\"\" class=\"wp-image-2998\"\/><\/figure>\n\n\n\n<p>The respective browser types and credential dumping qualities are shown below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"877\" height=\"605\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-7-1.webp\" alt=\"\" class=\"wp-image-2999\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"584\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-6-1.webp\" alt=\"\" class=\"wp-image-3000\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"963\" height=\"493\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-4-1.webp\" alt=\"\" class=\"wp-image-3001\"\/><\/figure>\n\n\n\n<p>Below we can see how SpriteCoin initiates various SQL commands in order to initiate a successful transaction:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"899\" height=\"545\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-2-1.webp\" alt=\"\" class=\"wp-image-3002\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"708\" height=\"430\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-2-1.webp\" alt=\"\" class=\"wp-image-3003\"\/><\/figure>\n\n\n\n<p>In order to maintain persistence, SpriteCoin also creates the following registry entry in the \u201cAppdata\u201d location:<br><br><em><strong>\u201cHKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\u201d \u00a0\/F \u00a0\/t \u00a0REG_SZ \/V &#8220;MoneroPay&#8221; \/D &#8220;%s&#8221;<\/strong><\/em><br><br>As a result, it continues executing even after reboots.<\/p>\n\n\n\n<p><strong>Dynamic analysis<\/strong><br><br>The first thing we uncovered during behavioral analysis was that the sample initiates a connection to the IP 103.198.0.2:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"727\" height=\"675\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-2-1.webp\" alt=\"\" class=\"wp-image-3004\"\/><\/figure>\n\n\n\n<p>This continues for multiple attempts:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"442\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/13-2-1.webp\" alt=\"\" class=\"wp-image-3005\"\/><\/figure>\n\n\n\n<p>Once successful, a new process \u201creg.exe\u201d initiates as a child process:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"706\" height=\"162\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/14-1-1.webp\" alt=\"\" class=\"wp-image-3006\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"431\" height=\"504\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/15-1-1.webp\" alt=\"\" class=\"wp-image-3007\"\/><\/figure>\n\n\n\n<p>Next, a connection to the onion site &#8220;jmqapf3nflatei35[.]onion[.]link&#8221; is initiated:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"968\" height=\"570\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/16-1-1.webp\" alt=\"\" class=\"wp-image-3008\"\/><\/figure>\n\n\n\n<p>SpriteCoin then sends the victim\u2019s user-name, PC name and browser credentials \u2013 the latter identified as \u2018pwdump\u2019 below:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"355\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/17-1-1-1024x355.webp\" alt=\"\" class=\"wp-image-3009\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"695\" height=\"359\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/18-1-1.webp\" alt=\"\" class=\"wp-image-3010\"\/><\/figure>\n\n\n\n<p>In terms of its ransomware capabilities, all data is encrypted with the \u201c.encrypted\u201d extension<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"668\" height=\"642\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/19-1-1.webp\" alt=\"\" class=\"wp-image-3011\"\/><\/figure>\n\n\n\n<p>The following ransom message is displayed on the desktop:<br><br><strong>Registries added<\/strong><br><br>HKU\\S-1-5-21-1473857359-2239192248-2645835995-1000\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\MoneroPay: &#8220;C:\\Users\\&lt;user-name>\\AppData\\Roaming\\MoneroPayAgent.exe&#8221;<\/p>\n\n\n\n<p><strong>Dropped Files<\/strong><br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Roaming\\<strong><em>MoneroPayAgent.exe<\/em><\/strong><br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\aohghmighlieiainnegkcijnfilokake\\0.9_0\\icon_128.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\aohghmighlieiainnegkcijnfilokake\\0.9_0\\icon_16.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\aohghmighlieiainnegkcijnfilokake\\0.9_0\\main.html.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\aohghmighlieiainnegkcijnfilokake\\0.9_0\\main.js.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\apdfllckaahabafndbhieahigkjlhalf\\14.1_0\\128.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\blpcfgokakmgnkcojhhkbfbldkacnbeo\\4.2.8_0\\128.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\coobgpohoikkiipiblmjeljniedjpjpf\\0.0.0.60_0\\128.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\coobgpohoikkiipiblmjeljniedjpjpf\\0.0.0.60_0\\16.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\coobgpohoikkiipiblmjeljniedjpjpf\\0.0.0.60_0\\32.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\coobgpohoikkiipiblmjeljniedjpjpf\\0.0.0.60_0\\48.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\felcaaldnbdncclmgdcncolpebgiejap\\1.1_0\\icon_128.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\felcaaldnbdncclmgdcncolpebgiejap\\1.1_0\\icon_16.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\felcaaldnbdncclmgdcncolpebgiejap\\1.1_0\\main.html.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\felcaaldnbdncclmgdcncolpebgiejap\\1.1_0\\main.js.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extensions\\ghbmnnjooekpmoecnnnilnnbdlolhkhi\\1.4_0\\128.png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA3i9QA[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA3kC8F[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA42hve[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA4BKPz[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA5i1hv[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA7S9LS[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA8xt7o[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA9fheW[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA9oKjx[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA9WclV[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AA9z9sE[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAbYAzQ[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAgi0nZ[1].png.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAh6aae[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAhiLQV[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAhplTG[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAhsNki[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAhuXUR[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAhwCPy[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAhwvlv[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAhxFXv[1].jpg.encrypted<br><br>\u2022&nbsp;&nbsp; &nbsp;C:\\Users\\&lt;user-name&gt;\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Low\\Content.IE5\\9D55DRDR\\AAhz38N[1].jpg.encrypted<\/p>\n\n\n\n<p><strong>Indicators of Compromise<\/strong><br><br><strong><em>Packed sample<\/em><\/strong><br><br>14ea53020b4d0cb5acbea0bf2207f3f6<br><br><strong><em>Unpacked sample<\/em><\/strong><br><br>ec917948471862504b19b643eb6e5e1f<br><br><strong><em>MoneroPayAgent.exe<\/em><\/strong><br><br>ec917948471862504b19b643eb6e5e1f &nbsp;<br><br><em><strong>IP Address\/CnC<\/strong><\/em><br><br>103.198.0.2<br><br><em><strong>Domain<\/strong><\/em><br><br>jmqapf3nflatei35[.]onion[.]link:80<\/p>\n\n\n\n<p><strong>Mitigations<\/strong><br><br>Starting the PC in safe mode with networking may enable a victim to kill any suspicious processes from the task manager. If this fails, restoring the PC to some previously created restore point is the best way to return to normal functionality.\u00a0<br><br>As always, particularly when it comes to the seemingly lucrative world of cryptocurrency, do your research. If something seems too good to be true, it probably is.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the hype around cryptocurrency sending values skyrocketing, it was only a matter of time until cyber criminals pounced. We&rsquo;re all familiar with attackers demanding payments in cryptocurrency but, in the case of SpriteCoin, hackers seem to have weaponised FOMO (fear of missing out). &nbsp; SpriteCoin ransomware takes advantage of the interest in cryptocurrency with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3012,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2990"}],"version-history":[{"count":6,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2990\/revisions"}],"predecessor-version":[{"id":4352,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2990\/revisions\/4352"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/3012"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}