produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address ip-static-94-242-253-30.server.lu on port 8000.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
10b389cd5c577528de47e3e566b08671

SHA-1:
b2830a48d20dc0f6ccb41e34b67e84ea3695d975

SHA-256:
ea1347091449f467e284b404c37ececb2f6cf19b16fd03e4fdc27e1ed816dc72

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
8/16/2018 3:21:10 AM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Glupteba
17.2.8.0

File size:
502 KB (514,048 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
2/7/2017 4:01:06 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x1C39E

Entry point:
E8, D8, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, B0, 52, 45, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 71, F8, FF, FF, F2, E9, DA, FF, FF, FF, 8B, 4D, EC, 33, CD, F2, E8, 60, F8, FF, FF, F2, E9, C9, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, F0, 46, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00...
 
[+]

Entropy:
6.5703

Code size:
333.5 KB (341,504 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe" \20506


The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to ip-static-94-242-253-30.server.lu  (94.242.253.30:8000)

TCP (HTTP SSL):
Connects to signin.g.ebay.com  (66.211.185.34:443)

TCP (SMTP):
Connects to mx003msb.fastweb.it  (85.18.95.12:25)

TCP (HTTP SSL):
Connects to instagram-p3-shv-01-ort2.fbcdn.net  (157.240.2.52:443)

TCP (SMTP):
Connects to fe20.mail.saunalahti.fi  (62.142.5.25:25)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-ort2.facebook.com  (157.240.2.35:443)

TCP (HTTP SSL):
Connects to e.mail.ru  (217.69.139.215:443)

TCP (HTTP SSL):
Connects to a23-43-132-129.deploy.static.akamaitechnologies.com  (23.43.132.129:443)

TCP (HTTP SSL):
Connects to a104-122-254-202.deploy.static.akamaitechnologies.com  (104.122.254.202:443)

TCP (WHOIS):
Connects to whois.networksolutions.com  (205.178.188.12:43)

TCP (WHOIS):
Connects to whois.localnet  (213.248.242.41:43)

TCP:
Connects to f755.fuchsia.servdiscount-customer.com  (85.14.243.91:8000)

TCP:
Connects to icebergcone.com  (91.142.85.224:444)

TCP (HTTP SSL):
Connects to a88-221-28-67.deploy.akamaitechnologies.com  (88.221.28.67:443)

TCP (HTTP):
Connects to www.wipo.int  (193.5.93.80:80)

TCP (HTTP):
Connects to std-carp38-http.nic.ru  (195.208.1.138:80)

TCP (HTTP):
Connects to static.37.58.243.136.clients.your-server.de  (136.243.58.37:80)

TCP (HTTP):
Connects to outgoing.ip-api.com  (81.4.121.206:80)

TCP (HTTP SSL):
Connects to mobileproxy.passport.yandex.net  (213.180.193.115:443)

TCP (HTTP SSL):
Connects to mail.yandex.ru  (213.180.193.125:443)

Remove produpd.exe - Powered by Reason Core Security