produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address server-54-192-98-210.arn1.r.cloudfront.net on port 443.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
7ae3dc21018b44c9c53d9801a81406c6

SHA-1:
009b55be902052387362119007d64ea7f87b53ec

SHA-256:
5928f09934adc9522bc574f730ed61a746167b6773ea81aaaf8c11557112a3f9

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
5/15/2024 3:55:27 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Glupteba
17.2.13.10

File size:
501.5 KB (513,536 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
2/13/2017 5:00:32 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x1C39E

Entry point:
E8, D8, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, B0, 52, 45, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 71, F8, FF, FF, F2, E9, DA, FF, FF, FF, 8B, 4D, EC, 33, CD, F2, E8, 60, F8, FF, FF, F2, E9, C9, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, F0, 46, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00...
 
[+]

Entropy:
6.5697

Code size:
333.5 KB (341,504 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe" \11516


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-54-192-98-210.arn1.r.cloudfront.net  (54.192.98.210:443)

TCP (HTTP):
Connects to www.nsobczak.pl  (195.191.248.87:80)

TCP:
Connects to dynamicip-88-87-80-170.pppoe.volgograd.ertelecom.ru  (88.87.80.170:4899)

TCP:
Connects to dhcp-202-254-208-178.metronv.ru  (178.208.254.202:4899)

TCP:
Connects to 55.33.224.159.triolan.net  (159.224.33.55:20000)

TCP (HTTP SSL):
Connects to ssl.trade4.beget.com  (5.101.152.28:443)

TCP (HTTP):
Connects to restore-stand3.vpsville.ru  (185.156.178.226:80)

TCP (HTTP):
Connects to node002.adplexity.com  (107.6.186.178:80)

TCP (HTTP):
Connects to livejournal.com  (81.19.74.1:80)

TCP (HTTP):
Connects to ec2-34-206-29-105.compute-1.amazonaws.com  (34.206.29.105:80)

TCP:
Connects to b-internet.212.20.50.130.nsk.rt.ru  (212.20.50.130:4899)

TCP (HTTP SSL):
Connects to a23-223-20-150.deploy.static.akamaitechnologies.com  (23.223.20.150:443)

TCP (HTTP):
Connects to 91-220-181-87.mvideo.ru  (91.220.181.87:80)

TCP (HTTP):
Connects to 91-220-181-5.mvideo.ru  (91.220.181.5:80)

TCP:
Connects to 217-79-9-100.obit.ru  (217.79.9.100:4899)

TCP:
Connects to ip-93-187-152-181.vipe-fsin.tehnosoft.ru  (93.187.152.181:4899)

TCP:
Connects to ip-176-110-169-166.clients.345000.ru  (176.110.169.166:4899)

TCP:
Connects to c218-177.globus-telecom.com  (82.198.177.218:4899)

TCP:
Connects to 78.244.135.79.in-addr.arpa  (79.135.244.78:8000)

Remove produpd.exe - Powered by Reason Core Security