produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 3 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address edge-star-mini-shv-01-fra3.facebook.com on port 443.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
a72cf57962052eb66793757e6eb09183

SHA-1:
92fef212afe5140425fed4f46667aaadd5cb4e17

SHA-256:
0c0aa9ce7c6cc922da8abd1ba6ef13b18ffb1fddff3bee3ba18b0afc6863a286

Scanner detections:
3 / 68

Status:
Malware

Analysis date:
12/26/2024 12:27:42 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Glupteba.AS trojan
6.3.12010.0

F-Secure
Variant.Razy.84351
5.15.154

Microsoft Security Essentials
Trojan:Win32/Carberp.BX!bit
1.233.897.0

File size:
542 KB (555,008 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
12/1/2016 9:05:14 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

CTPH (ssdeep):
12288:DYkcDFhrTiq45i/rFdh05DW5D+syA623k7LNu1Ts:D8iT5UdhNDRyA6207LNu1

Entry address:
0x2575C

Entry point:
E8, AA, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, B0, F2, 45, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 73, F8, FF, FF, F2, E9, DA, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, 90, 47, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B...
 
[+]

Entropy:
6.5446

Code size:
374.5 KB (383,488 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe" \8175


The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to ns3002298.ip-37-59-41.eu  (37.59.41.180:8000)

TCP (HTTP SSL):
Connects to reg.g.ebay.com  (66.135.209.72:443)

TCP:
Connects to interviewder.net  (91.203.5.26:8000)

TCP:
Connects to icebergcone.com  (91.142.85.224:8000)

TCP (WHOIS):
Connects to whois.enom.com  (69.64.157.42:43)

TCP (HTTP):
Connects to node001.adplexity.com  (107.6.167.194:80)

TCP (HTTP):
Connects to instagram-p3-shv-01-frt3.fbcdn.net  (31.13.92.51:80)

TCP (HTTP SSL):
Connects to api.g.ebay.com  (66.135.211.140:443)

TCP (HTTP SSL):
Connects to yandex.ru  (5.255.255.88:443)

TCP:
Connects to nodomen.ru  (89.184.67.224:8000)

TCP:
Connects to f755.fuchsia.servdiscount-customer.com  (85.14.243.91:8000)

TCP (HTTP SSL):
Connects to a173-222-185-107.deploy.static.akamaitechnologies.com  (173.222.185.107:443)

TCP (HTTP SSL):
Connects to a104-81-102-77.deploy.static.akamaitechnologies.com  (104.81.102.77:443)

TCP (WHOIS):
Connects to whois.nyc3.verisign.com  (199.7.50.74:43)

TCP (HTTP SSL):
Connects to server-54-192-186-202.cdg51.r.cloudfront.net  (54.192.186.202:443)

TCP (WHOIS):
Connects to ip-104-238-108-1.ip.secureserver.net  (104.238.108.1:43)

TCP (HTTP SSL):
Connects to a104-94-180-169.deploy.static.akamaitechnologies.com  (104.94.180.169:443)

TCP:
Connects to ZX_372_004_162  (91.218.160.67:4899)

TCP (HTTP):
Connects to win.mail.ru  (94.100.180.220:80)

TCP (HTTP SSL):
Connects to o2.mail.ru  (217.69.139.61:443)

Remove produpd.exe - Powered by Reason Core Security