Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.MobiDash.9685 14:37:04 19.04.2026 Show
Android.Banker.7371 14:07:03 19.04.2026 Show
Android.Banker.7370 14:06:11 19.04.2026 Show
Android.BankBot.16461 14:06:02 19.04.2026 Show
Android.DownLoader.5798 14:05:57 19.04.2026 Show
Android.Packed.60276 14:00:05 19.04.2026 Show
Android.Spy.7865 13:59:21 19.04.2026 Show
Android.DownLoader.5799 13:59:11 19.04.2026 Show
Android.MulDrop.8887 13:45:21 19.04.2026 Show
Android.BankBot.16471 13:39:24 19.04.2026 Show
Android.BankBot.16469 13:39:19 19.04.2026 Show
Android.BankBot.16470 13:39:14 19.04.2026 Show
Android.MobiDash.9688 13:35:57 19.04.2026 Show
Android.BankBot.16468 13:31:58 19.04.2026 Show
Android.BankBot.16462 13:26:43 19.04.2026 Show
Android.MobiDash.9687 13:26:38 19.04.2026 Show
Android.MulDrop.8886 13:26:32 19.04.2026 Show
Android.BankBot.16467 13:23:54 19.04.2026 Show
Android.BankBot.16465 13:23:49 19.04.2026 Show
Android.BankBot.16466 13:23:44 19.04.2026 Show
Android.BankBot.16463 13:11:25 19.04.2026 Show
Android.BankBot.16464 13:11:20 19.04.2026 Show
Android.MobiDash.9686 13:09:29 19.04.2026 Show
Android.MobiDash.9683 06:52:43 18.04.2026 Show
Android.DownLoader.5797 06:42:23 19.04.2026 Show
Android.Spy.7862 06:39:09 19.04.2026 Show
Android.Packed.60275 06:18:35 19.04.2026 Show
Android.Banker.7369 06:08:01 18.04.2026 Show
Trojan.MulDrop37.12303 06:05:12 19.04.2026 Show
Trojan.MulDrop37.13562 06:05:12 19.04.2026 Show
Trojan.MulDrop37.13824 06:05:12 19.04.2026 Show
Trojan.MulDrop37.13258 06:05:12 19.04.2026 Show
Trojan.DownLoader49.38992 06:05:12 19.04.2026 Show
Trojan.MulDrop37.13573 06:05:11 19.04.2026 Show
Trojan.MulDrop37.12735 06:05:11 19.04.2026 Show
Trojan.MulDrop37.12586 06:05:11 19.04.2026 Show
Trojan.MulDrop37.13203 06:05:11 19.04.2026 Show
Trojan.MulDrop37.12398 06:05:11 19.04.2026 Show
Trojan.MulDrop37.12138 06:05:11 19.04.2026 Show
Trojan.Inject6.37895 06:05:11 19.04.2026 Show
Trojan.MulDrop37.12421 06:05:11 19.04.2026 Show
Trojan.MulDrop37.13354 06:05:11 19.04.2026 Show
Trojan.Siggen32.34329 06:05:10 19.04.2026 Show
Trojan.Inject6.37778 06:05:10 19.04.2026 Show
Trojan.MulDrop37.13780 06:05:10 19.04.2026 Show
Trojan.MulDrop37.13399 06:05:10 19.04.2026 Show
Trojan.MulDrop37.12174 06:05:09 19.04.2026 Show
Trojan.MulDrop37.12445 06:05:09 19.04.2026 Show
Trojan.MulDrop37.12708 06:05:08 19.04.2026 Show
Trojan.DownLoader49.39014 06:05:08 19.04.2026 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.