{"id":86470,"date":"2018-07-10T17:46:26","date_gmt":"2018-07-10T12:16:26","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86470"},"modified":"2018-07-10T18:27:45","modified_gmt":"2018-07-10T12:57:45","slug":"new-ransom-miner-malware-campaign-emerging-wild","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/new-ransom-miner-malware-campaign-emerging-wild\/","title":{"rendered":"A new ransom-miner malware campaign emerging in wild!"},"content":{"rendered":"<p>Since the past few weeks, Quick Heal Security Labs has been observing a series of interesting malware blocked at our customer end. The further analysis of the malware &#8216;t.exe&#8217; revealed that the malware seems to be Trojan dropper. Interestingly, this multipurpose malware is downloading a ransomware component, a crypto-mining malware and many more. It also tries to perform various malicious activities by connecting to one or more CNC servers. This seems to be an ongoing in wild campaign targeting end users with Gandcrab ransomware and Monero Cryptominer malware.<\/p>\n<p>We are not aware of the initial attack vector of the file &#8216;t.exe&#8217; but we strongly suspect phishing mails being used to spread this malware. A majority of phishing emails contains links to malicious URLs or contains malicious attachments that in turn downloads malware on the end user systems.<\/p>\n<p>Let&#8217;s have a look at the below attack chain which depicts the execution sequence observed for this ransom-miner campaign.<\/p>\n<figure id=\"attachment_86491\" aria-describedby=\"caption-attachment-86491\" style=\"width: 698px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86491\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture1-1.png\" alt=\"\" width=\"698\" height=\"403\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture1-1.png 698w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture1-1-300x173.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture1-1-650x375.png 650w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><figcaption id=\"caption-attachment-86491\" class=\"wp-caption-text\">Fig 1: Infection Chain of Ransom-Miner malware campaign<\/figcaption><\/figure>\n<p>Even though we did not get hold of the initial attack vector, we were able to trace the attack chain from the malicious URL used here.<\/p>\n<p><em><i>URL: 92.63.197.112\/t[.]exe<\/i><\/em><\/p>\n<p>The &#8216;t.exe&#8217; file is PE32 executable\u00a0for MS Windows and compiled in Microsoft Visual C++. It seems to be a custom packed file. It contains an interesting resource section of a large size. It seems to be encrypted and contains data of high entropy. Resource name is ransom which is unusual.<\/p>\n<figure id=\"attachment_86492\" aria-describedby=\"caption-attachment-86492\" style=\"width: 595px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86492\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture2-1.png\" alt=\"\" width=\"595\" height=\"377\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture2-1.png 595w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture2-1-300x190.png 300w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><figcaption id=\"caption-attachment-86492\" class=\"wp-caption-text\">Fig 2. Resource section shown in CFF explorer<\/figcaption><\/figure>\n<p>After doing the analysis, we found that the malware reads one of the resources and then decrypts it with XOR operation. Key which is present in AL register is calculated in function &#8216;call_407B5C&#8217; present just before the XOR operation. Initial value of key is read from the file and then various operations are performed to get a final value in AL register.<\/p>\n<figure id=\"attachment_86493\" aria-describedby=\"caption-attachment-86493\" style=\"width: 554px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86493\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture3-1.png\" alt=\"\" width=\"554\" height=\"192\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture3-1.png 554w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture3-1-300x104.png 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><figcaption id=\"caption-attachment-86493\" class=\"wp-caption-text\">Fig 3. Decryption Routine<\/figcaption><\/figure>\n<p>The malware decrypts some code and one compressed PE file as shown in Fig 4. After decryption, the control goes to the decrypted code which decompressed PE file in memory and after that malware overwrites the parent process memory with the decompressed file and finally executes it. This decompressed file is the main malware file which performs further activity.<\/p>\n<figure id=\"attachment_86479\" aria-describedby=\"caption-attachment-86479\" style=\"width: 554px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86479\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture4.png\" alt=\"\" width=\"554\" height=\"345\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture4.png 554w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture4-300x187.png 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><figcaption id=\"caption-attachment-86479\" class=\"wp-caption-text\">Fig 4. Decrypted code and Compressed PE file<\/figcaption><\/figure>\n<p>The malware file contains hardcoded\u00a0process names. It calls &#8216;process32First&#8217; and &#8216;process32next&#8217; to enumerate various processes and compares 16 process names for identifying the presence of VMware and Virtual box and its related components. It also checks for the sandbox by checking the presence of library name \u201csbiedll.dll\u201d. These are the typical anti-VM and anti-sandbox techniques implemented in this malware.<\/p>\n<figure id=\"attachment_86480\" aria-describedby=\"caption-attachment-86480\" style=\"width: 571px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86480\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture5.png\" alt=\"\" width=\"571\" height=\"246\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture5.png 571w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture5-300x129.png 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><figcaption id=\"caption-attachment-86480\" class=\"wp-caption-text\">Fig 5. Various process names<\/figcaption><\/figure>\n<p>After identifying the existence of a virtual environment, the malware stop its malicious behavior and calls the &#8216;ExitProcess&#8217; function and stops current running process.<\/p>\n<figure id=\"attachment_86481\" aria-describedby=\"caption-attachment-86481\" style=\"width: 554px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86481\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture6.png\" alt=\"\" width=\"554\" height=\"197\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture6.png 554w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture6-300x107.png 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><figcaption id=\"caption-attachment-86481\" class=\"wp-caption-text\">Fig 6. Call ExitProcess if Virtual environment found<\/figcaption><\/figure>\n<p>It creates mutex by the name \u201c._<strong><b>_-TLDR-__<\/b><\/strong>.\u201d\u00a0 so that only one of its copies runs at any one time. It also creates its copy in %appdata% by random number name and in Windows folder by the following name &lt;<strong><b>C:\\WINDOWS\\T-5682806352635035603\\winsvc.exe<\/b><\/strong>&gt; and\u00a0deletes the original copy. It also sets file attributes to 7 which indicates file as hidden, read-only and file has system attributes.<\/p>\n<p>The Trojan also creates an entry of its file in the following registry so that it runs every time Windows starts:<\/p>\n<p>\u201c<strong><b>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run<\/b><\/strong>\\\u201d<\/p>\n<p>Entry present after malware infection looks like:<\/p>\n<figure id=\"attachment_86482\" aria-describedby=\"caption-attachment-86482\" style=\"width: 737px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86482\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture7.png\" alt=\"\" width=\"737\" height=\"185\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture7.png 737w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture7-300x75.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture7-650x163.png 650w\" sizes=\"(max-width: 737px) 100vw, 737px\" \/><figcaption id=\"caption-attachment-86482\" class=\"wp-caption-text\">Fig 7. Registry entries created by malware<\/figcaption><\/figure>\n<p>It also creates the following registry entries to disable Windows Firewall.<\/p>\n<figure id=\"attachment_86483\" aria-describedby=\"caption-attachment-86483\" style=\"width: 692px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86483\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture8.png\" alt=\"\" width=\"692\" height=\"80\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture8.png 692w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture8-300x35.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture8-650x75.png 650w\" sizes=\"(max-width: 692px) 100vw, 692px\" \/><figcaption id=\"caption-attachment-86483\" class=\"wp-caption-text\">Fig 8. Firewall registry entry<\/figcaption><\/figure>\n<p>The Trojan remains persistent in the memory &amp; tries to send a request to many CNC servers. It has many random domain names as shown in Fig 9. By connecting to these CNC domains, it tries to download further malicious components.<\/p>\n<figure id=\"attachment_86484\" aria-describedby=\"caption-attachment-86484\" style=\"width: 282px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86484\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture9.png\" alt=\"\" width=\"282\" height=\"339\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture9.png 282w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture9-250x300.png 250w\" sizes=\"(max-width: 282px) 100vw, 282px\" \/><figcaption id=\"caption-attachment-86484\" class=\"wp-caption-text\">Fig 9. CNC URLs present in the decrypted file<\/figcaption><\/figure>\n<p>It connects to available CNC servers over HTTP protocol to download multiple files. It downloads JavaScript, PE files, some text file.<\/p>\n<figure id=\"attachment_86485\" aria-describedby=\"caption-attachment-86485\" style=\"width: 765px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86485\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture10.png\" alt=\"\" width=\"765\" height=\"465\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture10.png 765w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture10-300x182.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture10-642x390.png 642w\" sizes=\"(max-width: 765px) 100vw, 765px\" \/><figcaption id=\"caption-attachment-86485\" class=\"wp-caption-text\">Fig 10. HTTP requests &amp; response from the infection traffic<\/figcaption><\/figure>\n<p>While analyzing the downloaded files, we have observed that one of the file it downloaded is JavaScript file<strong><b>\u00a0&#8216;go.js&#8217;.<\/b><\/strong>\u00a0Which is obfuscated and content is display in Fig 11. When executed the \u2018.js\u2019 file downloads and execute the malware &#8220;new.exe&#8221;.<\/p>\n<figure id=\"attachment_86486\" aria-describedby=\"caption-attachment-86486\" style=\"width: 715px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-86486 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture11.png\" alt=\"\" width=\"715\" height=\"382\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture11.png 715w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture11-300x160.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture11-650x347.png 650w\" sizes=\"(max-width: 715px) 100vw, 715px\" \/><figcaption id=\"caption-attachment-86486\" class=\"wp-caption-text\">Fig 11. Obfuscated js script<\/figcaption><\/figure>\n<p>De-obfuscating code of JavaScript has a Powershell one-liner code to download and execute a file new.exe in temp folder.<\/p>\n<figure id=\"attachment_86487\" aria-describedby=\"caption-attachment-86487\" style=\"width: 732px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86487\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture12.png\" alt=\"\" width=\"732\" height=\"134\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture12.png 732w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture12-300x55.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture12-650x119.png 650w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><figcaption id=\"caption-attachment-86487\" class=\"wp-caption-text\">Fig 12. De-obfuscated JavaScript<\/figcaption><\/figure>\n<p>List of Files downloaded by the malware:<\/p>\n<ul>\n<li>exe : 001bc79a0cc7a86c81f5fd3dc55d1f1e (Ransomware file)<\/li>\n<li>exe : 43cf277a897b299a8d0c27bbed98fa85 (Trojan)<\/li>\n<li>exe : 83df5b076f23e0bf2e68fbda29b245e2 (Trojan)<\/li>\n<li>exe : a3e5dabdfc394091e06e265f0c96c98d (cryptomining malware)<\/li>\n<li>exe : b74ad6183e0cc5471a219b4925c7e339 (Trojan)<\/li>\n<\/ul>\n<p>New.exe is gandcrab ransomware, it is executed through js script and it finds the IP address of the machine by making request to<strong><b>\u00a0ipv4bot.<\/b><\/strong><strong><b>whatismyipaddress.com<\/b><\/strong>\u00a0host. The public IP is received as a response. It loops again and again attempting to succeed. If it never receives public IP, it will never encrypt any file.<\/p>\n<figure id=\"attachment_86488\" aria-describedby=\"caption-attachment-86488\" style=\"width: 711px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-86488 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture13.png\" alt=\"\" width=\"711\" height=\"318\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture13.png 711w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture13-300x134.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture13-650x291.png 650w\" sizes=\"(max-width: 711px) 100vw, 711px\" \/><figcaption id=\"caption-attachment-86488\" class=\"wp-caption-text\">Fig 13. Request send to ipv4bot.whatismyipaddress.com<\/figcaption><\/figure>\n<p>The &#8216;new.exe&#8217; also uses nslookup to resolve the IP addresses. The hardcoded C&amp;C servers to which the malware performs nslookup are,<\/p>\n<p>nslookup ransomware.bit wowservers[.]ru<br \/>\nnslookup carder.bit ns1.wowservers[.]ru<\/p>\n<p>The initial trojan &#8216;t.exe&#8217;, also downloads a text file contain mailing list of recipients,\u00a0it may send messages out for spreading infection.\u00a0Below are some examples of the email ids found in text file.<\/p>\n<p>leiladonovan@verizon.net<br \/>\naromero2086@sbcglobal.net<br \/>\ngbhaiiknpd@flamail.com<br \/>\ngenesplace4ever@yahoo.com<br \/>\nsunflower_file@yahoo.com<br \/>\njsanders300@yahoo.com<br \/>\nmft@btinternet.com<br \/>\nbinoykphilip@yahoo.com<br \/>\nnicholascpa@yahoo.com<br \/>\njpica@graco.com<br \/>\nbarath_safety@yahoo.com<br \/>\ntjedrzej@yahoo.com<br \/>\nlisamsimms43@yahoo.com<br \/>\nkat@artcloth.com<br \/>\nbish4533@bellsouth.net<br \/>\ndaisygirl0224@yahoo.com<br \/>\nmarkfasano@email.com<br \/>\nwhitethickgurl2@myspace.com (etc&#8230;)<\/p>\n<p>In addition, another downloaded file &#8216;m.exe&#8217; of which running copy with name &#8216;wuapp.exe&#8217; connects to monerohash.com\u00a0( Monero coin miner -XMRig) over TCP port 3333 (a non-standard port) for doing mining activity. Generally, use of non-standard ports is observed in order to evade network security software such as IDS\/IPS.<\/p>\n<figure id=\"attachment_86489\" aria-describedby=\"caption-attachment-86489\" style=\"width: 632px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86489\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture14.png\" alt=\"\" width=\"632\" height=\"335\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture14.png 632w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture14-300x159.png 300w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><figcaption id=\"caption-attachment-86489\" class=\"wp-caption-text\">Fig 14. wuapp.exe process during Mining<\/figcaption><\/figure>\n<figure id=\"attachment_86490\" aria-describedby=\"caption-attachment-86490\" style=\"width: 713px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86490\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/07\/Picture15.png\" alt=\"\" width=\"713\" height=\"101\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture15.png 713w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture15-300x42.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/07\/Picture15-650x92.png 650w\" sizes=\"(max-width: 713px) 100vw, 713px\" \/><figcaption id=\"caption-attachment-86490\" class=\"wp-caption-text\">Fig 15. TCPview malware during mining at port 3333<\/figcaption><\/figure>\n<p><strong><b>Conclusion<\/b><\/strong><\/p>\n<p>Ransom-miner malware campaign represents an emerging threat which is able to download various payloads like ransomware, miner and other Trojans all together and adding new elements for infection. We advise our users to avoid accessing suspicious websites\/emails and keep their antivirus up-to-date to prevent their systems from being infected by such complex malwares. Quick Heal, with its advanced detection technology mechanism, has been consistently monitoring &amp; blocking these complex malware and malicious sites.<\/p>\n<p><strong><b>IOC:<\/b><\/strong><\/p>\n<p>01c4ce531727fe6e447e217c9404c0c1<\/p>\n<p><strong><b>Subject Matter Expert<\/b><\/strong><\/p>\n<p>Preksha Saxena | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the past few weeks, Quick Heal Security Labs has been observing a series of interesting malware blocked at our customer end. The further analysis of the malware &#8216;t.exe&#8217; revealed that the malware seems to be Trojan dropper. Interestingly, this multipurpose malware is downloading a ransomware component, a crypto-mining malware and many more. It also [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":86500,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[49,1534,50,40],"class_list":["post-86470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","tag-malware","tag-miner","tag-ransomware","tag-trojan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86470"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86470"}],"version-history":[{"count":6,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86470\/revisions"}],"predecessor-version":[{"id":86498,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86470\/revisions\/86498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86500"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}