produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address server-54-230-96-44.arn1.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
1972d3b5556ffbfce1b3ac974d855b2f

SHA-1:
8c8872e0ad8f0e931fa5cfbce46da60a80381607

SHA-256:
c9c73bf64c0788bebb69e3d43ded0e6e58c87cafd8bc030a6ba6191444cade19

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
5/8/2024 8:24:52 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Glupteba
16.11.28.0

File size:
562.5 KB (576,000 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
11/28/2016 7:05:19 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

CTPH (ssdeep):
12288:iCi6aMYhKOXVJicuKKmcH8aS5hIRz0u00BG9kSfnCkNhcVIP:iC21icuUA8aRz0r0BG9kSq0hcV

Entry address:
0x276CC

Entry point:
E8, AA, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, 7C, 42, 46, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 73, F8, FF, FF, F2, E9, DA, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, E0, 47, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B...
 
[+]

Entropy:
6.5585

Code size:
392.5 KB (401,920 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe"


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ns235458.ovh.net  (178.33.236.108:80)

TCP:
Connects to novric.natm.ru  (213.148.172.98:4899)

TCP:
Connects to nodomen.ru  (89.184.67.224:8000)

TCP:
Connects to b-internet.212.20.46.25.nsk.rt.ru  (212.20.46.25:4899)

TCP (HTTP):
Connects to 248.56.108.213.ip.ogicom.net  (213.108.56.248:80)

TCP:
Connects to 212.77.130.94.rikt.ru  (212.77.130.94:4899)

TCP (HTTP SSL):
Connects to o2.mail.ru  (217.69.139.61:443)

TCP (HTTP SSL):
Connects to auth.mail.ru  (94.100.180.60:443)

TCP (HTTP):
Connects to yandex.ru  (5.255.255.88:80)

TCP (HTTP):
Connects to rightnow.cdn.promodj.com  (91.213.196.100:80)

TCP (HTTP SSL):
Connects to rajf2-1.i.mail.ru  (94.100.184.68:443)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-frt3.facebook.com  (31.13.92.36:443)

TCP (HTTP):
Connects to ec2-52-200-138-20.compute-1.amazonaws.com  (52.200.138.20:80)

TCP (HTTP SSL):

TCP (HTTP SSL):
Connects to a95-101-248-45.deploy.akamaitechnologies.com  (95.101.248.45:443)

TCP (HTTP SSL):
Connects to a23-59-121-125.deploy.static.akamaitechnologies.com  (23.59.121.125:443)

TCP (HTTP SSL):
Connects to a104-96-150-251.deploy.static.akamaitechnologies.com  (104.96.150.251:443)

TCP (HTTP SSL):
Connects to wips.com  (88.86.125.12:443)

TCP (HTTP):
Connects to server-54-230-96-44.arn1.r.cloudfront.net  (54.230.96.44:80)

TCP:
Connects to ih425675.dedic.myihor.ru  (193.124.177.10:8000)

Remove produpd.exe - Powered by Reason Core Security