Jump to content
chrisvanemmerik

Backdoor.DarkComet false positive

Recommended Posts

My company's application has recently started showing up as a Backdoor.DarkComet threat.  Can you please explain.  We use software called turbo studio (https://turbo.net/studio) to package our software and run it in a virtual environment.  When the software is installed and attempted to run for the first time, the sandbox is created and Malware bytes stops the process and detects the threat on files created in the sandbox.  This threat occurs on numerous versions of our past software so it appears to be related to the turbo studio packaging process?  Can you please look into this and provide a solution or more information.   I have attached the necessary files.  An installer for our program is located here if you need to install and obverse the whole process: http://register.kobetron.com/downloads/VerifyPlus2.1.msi

Thanks.

 

output999.txt

sandbox_contents.zip

Share this post


Link to post
Share on other sites

Hello chrisvanemmerik,

Thanks for reporting this. These are indeed false positives and we'll correct these in our next database update. Sorry for the inconvenience.

 

Share this post


Link to post
Share on other sites
7 minutes ago, chrisvanemmerik said:

Ok thank you.  Can you provide an ETA?  We are trying to determine if we need to notify our customers or not.  Thanks.

You're welcome. About ~40 minutes. I'll update the thread with the database versions when they're available.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.