produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address 197.213.226.109.ip.orionnet.ru on port 4899.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
5a85206368f50bd3a811c0800f7b30ac

SHA-1:
c331677c2e4b1bebaa7ab9f1efde6745cadd5551

SHA-256:
3e33247f11d0a187788c4563ac0b90a27f5e125078b798fea765c3a757ad0d96

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
9/24/2018 8:55:37 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Glupteba
17.2.12.0

File size:
502 KB (514,048 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
2/11/2017 4:01:03 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x1C39E

Entry point:
E8, D8, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, B0, 52, 45, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 71, F8, FF, FF, F2, E9, DA, FF, FF, FF, 8B, 4D, EC, 33, CD, F2, E8, 60, F8, FF, FF, F2, E9, C9, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, F0, 46, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00...
 
[+]

Entropy:
6.5692

Code size:
333.5 KB (341,504 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe" \20506


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to webdesignlab.in  (216.245.218.133:80)

TCP (HTTP SSL):
Connects to passport.yandex.ru  (213.180.204.24:443)

TCP (HTTP):
Connects to mxhost1.sitek.net  (212.34.32.72:80)

TCP (HTTP SSL):
Connects to mobileproxy.passport.yandex.net  (213.180.193.115:443)

TCP (HTTP SSL):
Connects to e.mail.ru  (217.69.139.215:443)

TCP (HTTP SSL):
Connects to a23-194-74-124.deploy.static.akamaitechnologies.com  (23.194.74.124:443)

TCP (HTTP SSL):
Connects to a104-81-62-72.deploy.static.akamaitechnologies.com  (104.81.62.72:443)

TCP (HTTP SSL):
Connects to a104-81-113-71.deploy.static.akamaitechnologies.com  (104.81.113.71:443)

TCP (HTTP SSL):
Connects to a104-81-107-236.deploy.static.akamaitechnologies.com  (104.81.107.236:443)

TCP (HTTP SSL):
Connects to a104-81-102-77.deploy.static.akamaitechnologies.com  (104.81.102.77:443)

TCP (WHOIS):
Connects to whois.ripe.net  (193.0.6.135:43)

TCP (WHOIS):
Connects to whois.publicinterestregistry.net  (199.15.84.131:43)

TCP (WHOIS):
Connects to whois.nic.cz  (217.31.205.42:43)

TCP (WHOIS):
Connects to whois.denic.de  (81.91.170.6:43)

TCP (WHOIS):
Connects to registro.lacnic.net  (200.3.14.10:43)

TCP (WHOIS):
Connects to nb-185-3-93-80.london.nodebalancer.linode.com  (185.3.93.80:43)

TCP (WHOIS):
Connects to ec2-52-213-130-166.eu-west-1.compute.amazonaws.com  (52.213.130.166:43)

TCP:
Connects to f755.fuchsia.servdiscount-customer.com  (85.14.243.91:8000)

TCP:
Connects to 197.213.226.109.ip.orionnet.ru  (109.226.213.197:4899)

TCP (SMTP):
Connects to mx1.hotmail.com  (104.44.194.236:25)

Remove produpd.exe - Powered by Reason Core Security