produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address 89-249-49-86.nets.ipct.ru on port 4899.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
8438c47cb5e03de1d467bbb47880880e

SHA-1:
3cecaf9a691d3903827ce953b9f21cc5cee560d4

SHA-256:
29c863334f89eb90ae88fe98128371b0cba9baa59a98550dd93e6eb064bf342d

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/28/2024 5:06:06 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Glupteba
17.1.30.1

File size:
502 KB (514,048 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
1/29/2017 8:34:22 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x1C39E

Entry point:
E8, D8, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, B0, 52, 45, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 71, F8, FF, FF, F2, E9, DA, FF, FF, FF, 8B, 4D, EC, 33, CD, F2, E8, 60, F8, FF, FF, F2, E9, C9, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, F0, 46, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00...
 
[+]

Entropy:
6.5700

Code size:
333.5 KB (341,504 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe" \20506


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.poludnie.eu  (195.191.249.131:80)

TCP (WHOIS):
Connects to whois.domain-registry.nl  (94.198.154.138:43)

TCP (HTTP SSL):
Connects to server-54-230-15-184.ams1.r.cloudfront.net  (54.230.15.184:443)

TCP:
Connects to interviewder.net  (91.203.5.26:8000)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-fra3.facebook.com  (31.13.93.36:443)

TCP (HTTP):
Connects to ec2-54-209-103-4.compute-1.amazonaws.com  (54.209.103.4:80)

TCP (HTTP SSL):
Connects to server-52-85-242-124.arn1.r.cloudfront.net  (52.85.242.124:443)

TCP (HTTP SSL):
Connects to a104-96-150-251.deploy.static.akamaitechnologies.com  (104.96.150.251:443)

TCP (HTTP):
Connects to yandex.ru  (5.255.255.60:80)

TCP (HTTP):
Connects to l2top.ru  (91.121.37.31:80)

TCP:
Connects to icebergcone.com  (91.142.85.224:8000)

TCP:
Connects to 89-249-49-86.nets.ipct.ru  (89.249.49.86:4899)

TCP:
Connects to 197-142.rosintel.net  (178.252.197.142:4899)

TCP:
Connects to 188x235x136x28.static-business.saratov.ertelecom.ru  (188.235.136.28:4899)

TCP (HTTP SSL):
Connects to signin.g.ebay.com  (66.211.181.81:443)

TCP:
Connects to nodomen.ru  (89.184.67.224:8000)

TCP (WHOIS):
Connects to ip-104-238-108-1.ip.secureserver.net  (104.238.108.1:43)

TCP (WHOIS):
Connects to whois.1and1.org  (212.227.15.229:43)

TCP (HTTP SSL):
Connects to rajf1-1.i.mail.ru  (94.100.184.66:443)

TCP:
Connects to imap5.mail.vip.ir2.yahoo.com  (188.125.69.63:993)

Remove produpd.exe - Powered by Reason Core Security