produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address interviewder.net on port 444.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
96df3c9e46c78433eee28880501775a9

SHA-1:
92a0de754d3790783b6a4af8b325fb1940f6a1da

SHA-256:
c0cc2024a8802fb4c7956e76809565b2fd7073b92edbbc545604f223f3bee036

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/26/2024 12:19:53 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Glupteba
16.11.15.22

File size:
562.5 KB (576,000 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
11/14/2016 8:05:21 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

CTPH (ssdeep):
12288:2Ci6aMYhKOXVJicuKKmcH8aS5hIRz0u00BG9kSfnCkBhcVIP:2C21icuUA8aRz0r0BG9kSqIhcV

Entry address:
0x276CC

Entry point:
E8, AA, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, 7C, 42, 46, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 73, F8, FF, FF, F2, E9, DA, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, E0, 47, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B...
 
[+]

Entropy:
6.5585

Code size:
392.5 KB (401,920 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe"


The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to malta1752.dedicatedpanel.com  (85.25.210.136:444)

TCP:
Connects to ns342617.ip-176-31-106.eu  (176.31.106.23:444)

TCP:
Connects to p087.purple.myloc.de  (85.114.133.87:444)

TCP:
Connects to icebergcone.com  (91.142.85.224:444)

TCP:
Connects to pls.com  (213.159.212.188:444)

TCP:
Connects to u022.umbra.myloc.de  (85.114.140.22:444)

TCP (HTTP):
Connects to g1.formy.net  (195.191.248.36:80)

TCP:
Connects to lenionspeak.com  (217.23.9.202:444)

TCP:
Connects to interviewder.net  (91.203.5.26:444)

TCP:
Connects to imap-b-atc-b.mx.aol.com  (152.163.0.98:993)

TCP (HTTP):
Connects to cs-http.yandex.ru  (213.180.204.22:80)

TCP (HTTP SSL):
Connects to a23-206-32-15.deploy.static.akamaitechnologies.com  (23.206.32.15:443)

TCP (HTTP SSL):
Connects to a104-109-107-107.deploy.static.akamaitechnologies.com  (104.109.107.107:443)

TCP (HTTP SSL):
Connects to o2.mail.ru  (217.69.139.61:443)

TCP:
Connects to ih371556.dedic.myihor.ru  (193.124.179.165:444)

TCP (HTTP SSL):
Connects to e.mail.ru  (217.69.139.215:443)

TCP (HTTP):
Connects to khi77.pie.net.pk  (202.125.134.154:80)

TCP (HTTP SSL):
Connects to instagram-p3-shv-01-sea1.fbcdn.net  (31.13.76.84:443)

TCP:
Connects to awm.com  (185.31.161.100:444)

TCP (HTTP SSL):
Connects to a104-94-180-169.deploy.static.akamaitechnologies.com  (104.94.180.169:443)

Remove produpd.exe - Powered by Reason Core Security