produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 2 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address mail.rambler.ru on port 443.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
abf144f981295a8e3792d06a94140f70

SHA-1:
35ee50847e80483cb7b0aa9bff158c8439887ac9

SHA-256:
f732daa94f55155264b96a339696e9a5bd60821a63835762162e14e21223ab67

Scanner detections:
2 / 68

Status:
Malware

Analysis date:
11/23/2024 8:24:11 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Glupteba.AU trojan
6.3.12010.0

F-Secure
Variant.Zusy.214304
5.16.24

File size:
511.5 KB (523,776 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
2/27/2017 7:01:05 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x1DC21

Entry point:
E8, F5, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, 84, 72, 45, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 6E, F8, FF, FF, F2, E9, DA, FF, FF, FF, 8B, 4D, EC, 33, CD, F2, E8, 5D, F8, FF, FF, F2, E9, C9, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, 20, 47, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00...
 
[+]

Code size:
340.5 KB (348,672 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe" \20849


The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to ip-static-94-242-253-30.server.lu  (94.242.253.30:8000)

TCP:
Connects to ih425675.dedic.myihor.ru  (193.124.177.10:8000)

TCP (HTTP):
Connects to win.mail.ru  (217.69.139.220:80)

TCP (HTTP SSL):
Connects to signin.g.ebay.com  (66.211.181.81:443)

TCP (HTTP):
Connects to 91-220-181-5.mvideo.ru  (91.220.181.5:80)

TCP:
Connects to icebergcone.com  (91.142.85.224:8000)

TCP (HTTP SSL):
Connects to wips.com  (88.86.125.12:443)

TCP (HTTP SSL):
Connects to a104-94-55-49.deploy.static.akamaitechnologies.com  (104.94.55.49:443)

TCP:
Connects to f755.fuchsia.servdiscount-customer.com  (85.14.243.91:8000)

TCP (HTTP SSL):
Connects to ec2-54-77-38-116.eu-west-1.compute.amazonaws.com  (54.77.38.116:443)

TCP (HTTP SSL):
Connects to ec2-52-34-37-177.us-west-2.compute.amazonaws.com  (52.34.37.177:443)

TCP (HTTP):

TCP (HTTP SSL):
Connects to instagram-p3-shv-01-fra3.fbcdn.net  (31.13.93.52:443)

TCP (HTTP SSL):
Connects to ec2-52-39-24-163.us-west-2.compute.amazonaws.com  (52.39.24.163:443)

TCP (HTTP SSL):
Connects to ec2-52-208-6-155.eu-west-1.compute.amazonaws.com  (52.208.6.155:443)

TCP (HTTP SSL):
Connects to a104-94-180-169.deploy.static.akamaitechnologies.com  (104.94.180.169:443)

TCP (HTTP):
Connects to l2top.ru  (91.121.37.31:80)

TCP (HTTP SSL):
Connects to e.mail.ru  (94.100.180.215:443)

TCP (HTTP):
Connects to yandex.ru  (5.255.255.55:80)

TCP (HTTP):
Connects to www.format.nieruchomosci.pl  (195.191.249.125:80)

Remove produpd.exe - Powered by Reason Core Security