Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.BankBot.15781 15:22:24 09.11.2025 Show
Android.BankBot.15780 14:29:23 09.11.2025 Show
Android.MulDrop.1444 14:21:58 09.11.2025 Show
Android.MobiDash.8484 13:59:28 09.11.2025 Show
Android.MobiDash.8480 07:33:19 09.11.2025 Show
Android.BankBot.Coper.7410 07:29:30 09.11.2025 Show
Android.MobiDash.8479 06:31:00 09.11.2025 Show
Android.MobiDash.8483 05:35:19 09.11.2025 Show
Android.MulDrop.1443 05:29:14 09.11.2025 Show
Android.MobiDash.8482 05:29:07 09.11.2025 Show
Android.MobiDash.8481 05:29:02 09.11.2025 Show
Android.BankBot.Coper.7409 05:21:27 08.11.2025 Show
Android.Packed.58102 05:15:38 08.11.2025 Show
Android.MobiDash.8478 05:04:24 08.11.2025 Show
Android.Packed.58101 04:56:11 08.11.2025 Show
Trojan.MulDrop33.41620 03:02:16 09.11.2025 Show
Trojan.DownLoader49.12077 03:02:16 09.11.2025 Show
Trojan.MulDrop33.41132 03:02:16 09.11.2025 Show
Trojan.MulDrop33.41679 03:02:16 09.11.2025 Show
Trojan.MulDrop33.41146 03:02:16 09.11.2025 Show
Trojan.Siggen32.6110 03:02:16 09.11.2025 Show
Trojan.Inject6.14096 03:02:16 09.11.2025 Show
Trojan.DownLoader49.11987 03:02:16 09.11.2025 Show
Trojan.PWS.Siggen3.42251 03:02:16 09.11.2025 Show
Trojan.MulDrop33.41155 03:02:16 09.11.2025 Show
Trojan.MulDrop33.40967 03:02:15 09.11.2025 Show
Trojan.MulDrop33.41405 03:02:15 09.11.2025 Show
Trojan.MulDrop33.41481 03:02:15 09.11.2025 Show
Trojan.DownLoader49.11994 03:02:15 09.11.2025 Show
Trojan.MulDrop33.41128 03:02:15 09.11.2025 Show
Trojan.MulDrop33.41009 03:02:15 09.11.2025 Show
Trojan.MulDrop33.41386 03:02:15 09.11.2025 Show
Trojan.DownLoader49.11851 03:02:14 09.11.2025 Show
Trojan.DownLoader49.11930 03:02:14 09.11.2025 Show
Trojan.MulDrop33.41771 03:02:14 09.11.2025 Show
Trojan.MulDrop33.41216 03:02:14 09.11.2025 Show
Trojan.Inject6.14097 03:02:14 09.11.2025 Show
Trojan.MulDrop33.41343 03:02:14 09.11.2025 Show
Trojan.MulDrop33.41705 03:02:14 09.11.2025 Show
Trojan.MulDrop33.41426 03:02:14 09.11.2025 Show
Trojan.MulDrop33.40953 03:02:14 09.11.2025 Show
Trojan.MulDrop33.41197 03:02:14 09.11.2025 Show
Trojan.Siggen32.6091 03:02:14 09.11.2025 Show
Trojan.Siggen32.6131 03:02:14 09.11.2025 Show
Trojan.DownLoader49.11945 03:02:13 09.11.2025 Show
Trojan.DownLoader49.11988 03:02:13 09.11.2025 Show
Trojan.DownLoader49.12008 03:02:13 09.11.2025 Show
Trojan.Inject6.14033 03:02:13 09.11.2025 Show
Trojan.PWS.Siggen3.42244 03:02:13 09.11.2025 Show
Trojan.Inject6.13938 03:02:13 09.11.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.