Backdoor.DarkKomet
Posted: May 20, 2013
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Ranking: | 4,416 |
|---|---|
| Threat Level: | 6/10 |
| Infected PCs: | 115,278 |
| First Seen: | May 20, 2013 |
|---|---|
| Last Seen: | March 8, 2025 |
| OS(es) Affected: | Windows |
The DarkKomet malware is categorized by security researchers as a backdoor trojan that is designed to infiltrate systems as an attached file to spam emails. The DarkKomet backdoor trojan is programmed to open a port as a backdoor to the system for attackers to exploit. The handlers of Backdoor.DarkKomet can steal files, record keystrokes, take screenshots and manipulate programs on the victim's PC. Additionally, the Backdoor.DarkKomet malware can be employed to install Bitcoin mining tools, conduct cloud-computing and launch DDoS attacks at websites and services of companies and governments. Needless to say, the Backdoor.DarkKomet malware is a severe threat to the stability of your OS and the safety of your documents, image and video files and log-in credentials. You may wish to know that the symptoms of Backdoor.DarkKomet encompass slower computer performance, an unsolicited launch of programs, suspicious background services, and poor Internet bandwidth. Computer users who face the problems mentioned before might want to consider installing a trustworthy anti-malware application to scan and clean their system.
Aliases
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%WINDIR%\svchost\svchost.exe
File name: svchost.exeSize: 1.19 MB (1197099 bytes)
MD5: 2bef02594106e27d81a17a885c9efe0d
Detection count: 386
File type: Executable File
Mime Type: unknown/exe
Path: %WINDIR%\svchost
Group: Malware file
Last Updated: September 15, 2016
C:\Users\<username>\AppData\Local\Temp\IXP000.TMP\M.exe
File name: M.exeSize: 339.96 KB (339968 bytes)
MD5: 40527d9f884efd415be418046ba328d3
Detection count: 98
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Local\Temp\IXP000.TMP\M.exe
Group: Malware file
Last Updated: August 30, 2021
file.exe
File name: file.exeSize: 538.47 KB (538474 bytes)
MD5: f0824e67a6528161903f57db61401d63
Detection count: 66
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\WinDefender\windefender.exe
File name: windefender.exeSize: 327.15 MB (327155712 bytes)
MD5: 4aa28c33b7dae76750e215a90e378f09
Detection count: 47
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\WinDefender
Group: Malware file
Last Updated: October 27, 2017
%APPDATA%\Microsoft\System\Services\service.exe
File name: service.exeSize: 6.51 MB (6517248 bytes)
MD5: 53fbd2492211dba078aa8aaf1c807f0e
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%\Microsoft\System\Services
Group: Malware file
Last Updated: November 26, 2016
%TEMP%\steamservice.exe
File name: steamservice.exeSize: 483.32 KB (483328 bytes)
MD5: 27eea7c653a1f397f55fca8e0826c764
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%
Group: Malware file
Last Updated: February 8, 2017
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\exossec.vbs
File name: exossec.vbsSize: 384B (384 bytes)
MD5: 656c840fc9837ec0437ef31ad4bb33a1
Detection count: 25
Mime Type: unknown/vbs
Path: %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup
Group: Malware file
Last Updated: February 9, 2017
%USERPROFILE%\Documents\Windows Media Player\bin\WMPUpd.exe
File name: WMPUpd.exeSize: 424.01 KB (424019 bytes)
MD5: 1e9e9cdec7282d81bc8c891dc6047463
Detection count: 4
File type: Executable File
Mime Type: unknown/exe
Path: %USERPROFILE%\Documents\Windows Media Player\bin
Group: Malware file
Last Updated: June 10, 2017
More files
Registry Modifications
Regexp file mask%allusersprofile%\application data\synaptics\synaptics.exe%allusersprofile%\synaptics\synaptics.exe%APPDATA%\Adobe\Adobe.exe%APPDATA%\Microsoft\mstsc.exe%APPDATA%\WinDefender\windefender.exe%userprofile%\Desktop\MSDCSC\msdcsc.exe%userprofile%\documents\DSCMIN\IMDSC.exe%WINDIR%\svchost\svchost.exeHKEY..\..\..\..{RegistryKeys}SOFTWARE\DC3_FEXEC
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.