Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.PackedNET.2429 11:08:47 16.10.2024 Show
VBS.DownLoader.2822 11:01:58 28.12.2024 Show
PowerShell.DownLoader.1640 10:58:11 26.11.2024 Show
Android.RemoteCode.8477 06:23:42 24.01.2025 Show
Android.BankBot.Coper.6640 05:13:07 23.01.2025 Show
Trojan.Siggen30.53128 03:01:37 24.01.2025 Show
Trojan.DownLoader48.5248 03:01:37 24.01.2025 Show
Trojan.DownLoader48.5053 03:01:37 24.01.2025 Show
Trojan.Siggen30.53218 03:01:36 24.01.2025 Show
Trojan.PWS.Stealer.42008 03:01:36 24.01.2025 Show
Trojan.DownLoader48.5210 03:01:36 24.01.2025 Show
Trojan.DownLoader48.5147 03:01:36 24.01.2025 Show
Trojan.MulDrop29.725 03:01:36 24.01.2025 Show
Trojan.Siggen30.53478 03:01:36 24.01.2025 Show
Trojan.MulDrop29.791 03:01:36 24.01.2025 Show
Trojan.MulDrop29.638 03:01:36 24.01.2025 Show
Trojan.Bladabindi.483 03:01:36 24.01.2025 Show
Trojan.Siggen30.53115 03:01:36 24.01.2025 Show
Trojan.Siggen30.53217 03:01:36 24.01.2025 Show
Trojan.Siggen30.53504 03:01:35 24.01.2025 Show
Trojan.Siggen30.53219 03:01:35 24.01.2025 Show
Trojan.Siggen30.53222 03:01:35 24.01.2025 Show
Trojan.MulDrop29.850 03:01:35 24.01.2025 Show
Trojan.DownLoader48.5214 03:01:35 24.01.2025 Show
Trojan.MulDrop29.869 03:01:35 24.01.2025 Show
Trojan.Siggen30.53543 03:01:35 24.01.2025 Show
Trojan.Siggen30.53209 03:01:35 24.01.2025 Show
Trojan.Siggen30.53482 03:01:35 24.01.2025 Show
Trojan.MulDrop29.728 03:01:35 24.01.2025 Show
Trojan.Siggen30.53216 03:01:34 24.01.2025 Show
Trojan.Siggen30.53396 03:01:34 24.01.2025 Show
Trojan.Siggen30.53129 03:01:34 24.01.2025 Show
Trojan.Siggen30.53519 03:01:34 24.01.2025 Show
Trojan.MulDrop29.878 03:01:34 24.01.2025 Show
Trojan.Siggen30.53680 03:01:33 24.01.2025 Show
Trojan.Popuper.46413 03:01:33 24.01.2025 Show
Trojan.Siggen30.53427 03:01:33 24.01.2025 Show
Trojan.Siggen30.53376 03:01:33 24.01.2025 Show
Trojan.MulDrop29.807 03:01:33 24.01.2025 Show
Trojan.DownLoader48.5196 03:01:32 24.01.2025 Show
Trojan.MulDrop29.989 03:01:32 24.01.2025 Show
Trojan.KeyLogger.44324 03:01:32 24.01.2025 Show
Trojan.DownLoader48.5212 03:01:32 24.01.2025 Show
Trojan.DownLoader48.5056 03:01:32 24.01.2025 Show
Trojan.Siggen30.53373 03:01:32 24.01.2025 Show
Trojan.MulDrop29.883 03:01:32 24.01.2025 Show
Trojan.Inject5.15079 03:01:32 24.01.2025 Show
Trojan.Siggen30.53238 03:01:32 24.01.2025 Show
Trojan.MulDrop29.923 03:01:32 24.01.2025 Show
Trojan.Siggen30.53408 03:01:32 24.01.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.