produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address signin.g.ebay.com on port 443.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
f6f8bec02bbf9fd59e2a9030fd20136d

SHA-1:
2ccdf08f268b395865e470b7f6699f102e04fdd0

SHA-256:
eb17123388b3d4cc939503a441a9777aa29c6c763f575be0a019fcd2b6efe0d5

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/25/2024 7:50:56 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Glupteba
16.11.20.0

File size:
562.5 KB (576,000 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
11/20/2016 7:05:24 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

CTPH (ssdeep):
12288:2Ci6aMYhKOXVJicuKKmcH8aS5hIRz0u00BG9kSfnCkhhcVIP:2C21icuUA8aRz0r0BG9kSq4hcV

Entry address:
0x276CC

Entry point:
E8, AA, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, 7C, 42, 46, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 73, F8, FF, FF, F2, E9, DA, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, E0, 47, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B...
 
[+]

Entropy:
6.5585

Code size:
392.5 KB (401,920 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe"


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to signin.g.ebay.com  (66.211.181.81:443)

TCP (HTTP SSL):
Connects to a104-94-180-169.deploy.static.akamaitechnologies.com  (104.94.180.169:443)

TCP:
Connects to f755.fuchsia.servdiscount-customer.com  (85.14.243.91:444)

TCP (HTTP):
Connects to www.gratka.pl  (195.8.99.1:80)

TCP (WHOIS):
Connects to whois.stk1.verisign.com  (199.7.56.74:43)

TCP (WHOIS):
Connects to whois.enom.com  (69.64.157.42:43)

TCP (HTTP):
Connects to w2.formy.net  (195.191.248.174:80)

TCP (HTTP SSL):
Connects to server-54-192-129-184.ams50.r.cloudfront.net  (54.192.129.184:443)

TCP (HTTP):
Connects to cluster011.ovh.net  (87.98.239.40:80)

TCP (HTTP):
Connects to abj69.rev.netart.pl  (77.55.35.69:80)

TCP (HTTP):
Connects to 207.ip-51-254-38.eu  (51.254.38.207:80)

TCP (HTTP):
Connects to yandex.ru  (77.88.55.80:80)

TCP (HTTP SSL):
Connects to webcluster.ngs.ru  (195.93.187.10:443)

TCP (HTTP):
Connects to suggest.yandex.net  (87.250.250.63:80)

TCP (HTTP SSL):
Connects to static.172.8.251.148.clients.your-server.de  (148.251.8.172:443)

TCP (HTTP):
Connects to quassia.viviotech.net  (199.73.59.98:80)

TCP (HTTP):
Connects to phatbass.ru  (62.109.9.66:80)

TCP (HTTP):
Connects to p8.coowo.com  (60.199.166.51:80)

TCP (HTTP):
Connects to p3slh031.shr.phx3.secureserver.net  (68.178.254.128:80)

TCP (HTTP):
Connects to ip17.155.odnoklassniki.ru  (217.20.155.17:80)

Remove produpd.exe - Powered by Reason Core Security