Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.BankBot.15694 14:39:57 28.09.2025 Show
Android.BankBot.15693 14:39:53 28.09.2025 Show
Android.MobiDash.8290 14:29:02 28.09.2025 Show
Android.MobiDash.8291 14:28:56 28.09.2025 Show
Android.MobiDash.8288 07:51:05 27.09.2025 Show
Android.MobiDash.8289 07:17:32 28.09.2025 Show
Android.BankBot.Ermac.150 06:34:13 28.09.2025 Show
Trojan.Inject6.4151 03:05:03 28.09.2025 Show
Trojan.MulDrop32.60973 03:05:03 28.09.2025 Show
Trojan.MulDrop32.61558 03:05:03 28.09.2025 Show
Trojan.MulDrop32.60988 03:05:03 28.09.2025 Show
Trojan.MulDrop32.61453 03:05:03 28.09.2025 Show
Trojan.MulDrop32.61106 03:05:02 28.09.2025 Show
Trojan.MulDrop32.61161 03:05:02 28.09.2025 Show
Trojan.DownLoader49.809 03:05:02 28.09.2025 Show
Trojan.MulDrop32.61243 03:05:02 28.09.2025 Show
Trojan.Siggen31.58569 03:05:02 28.09.2025 Show
Trojan.MulDrop32.61284 03:05:02 28.09.2025 Show
Trojan.DownLoader49.736 03:05:02 28.09.2025 Show
Trojan.Inject6.4157 03:05:02 28.09.2025 Show
Trojan.Siggen31.58520 03:05:02 28.09.2025 Show
Trojan.Siggen31.58458 03:05:01 28.09.2025 Show
Trojan.BankBot.1834 03:05:01 28.09.2025 Show
Trojan.DownLoader49.760 03:05:01 28.09.2025 Show
Trojan.MulDrop32.60835 03:05:01 28.09.2025 Show
Trojan.BankBot.1829 03:05:01 28.09.2025 Show
Trojan.Gozi.1662 03:05:01 28.09.2025 Show
Trojan.MulDrop32.61681 03:05:01 28.09.2025 Show
Trojan.MulDrop32.60689 03:05:00 28.09.2025 Show
Trojan.BankBot.1852 03:05:00 28.09.2025 Show
Trojan.MulDrop32.60918 03:05:00 28.09.2025 Show
Trojan.MulDrop32.61424 03:05:00 28.09.2025 Show
Trojan.Siggen31.58617 03:05:00 28.09.2025 Show
Trojan.MulDrop32.61159 03:05:00 28.09.2025 Show
Trojan.MulDrop32.61162 03:04:59 28.09.2025 Show
Trojan.Siggen31.58580 03:04:58 28.09.2025 Show
Trojan.MulDrop32.61794 03:04:58 28.09.2025 Show
Trojan.MulDrop32.60777 03:04:57 28.09.2025 Show
Trojan.Inject6.4160 03:04:57 28.09.2025 Show
Trojan.MulDrop32.61568 03:04:56 28.09.2025 Show
Trojan.Inject6.4201 03:04:56 28.09.2025 Show
Trojan.MulDrop32.61245 03:04:56 28.09.2025 Show
Trojan.KillProc2.36634 03:04:56 28.09.2025 Show
Trojan.Inject6.4130 03:04:56 28.09.2025 Show
Trojan.MulDrop32.61889 03:04:56 28.09.2025 Show
Trojan.Inject6.4108 03:04:56 28.09.2025 Show
Trojan.MulDrop32.61273 03:04:56 28.09.2025 Show
Trojan.DownLoader49.744 03:04:56 28.09.2025 Show
Trojan.MulDrop32.61896 03:04:55 28.09.2025 Show
Trojan.MulDrop32.61370 03:04:55 28.09.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.