Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.BankBot.Coper in virus library:

A family of banking trojans for Android devices. They have a modular architecture and various protective mechanisms to guard against their deletion. When targeted devices are infected, these bankers try to obtain access to the Accessibility Services functions that will allow them to perform all malicious actions without user interaction.

The Android.BankBot.Coper trojans are capable of:

  • executing USSD requests;
  • sending SMS;
  • intercepting SMS;
  • locking and unlocking the device screen;
  • intercepting and hiding push notifications;
  • displaying push notifications;
  • displaying phishing windows on top of the targeted applications interface;
  • intercepting the information typed on the keyboard (a keylogger functionality);
  • uninstalling apps upon C&C server command, and
  • uninstalling themselves from the infected device.

Android.BankBot.Coper in virus library:

Android.BankBot.Coper.4395
Android.BankBot.Coper.4396
Android.BankBot.Coper.4397
Android.BankBot.Coper.4398
Android.BankBot.Coper.440
Android.BankBot.Coper.4400
Android.BankBot.Coper.4401
Android.BankBot.Coper.4402
Android.BankBot.Coper.4403
Android.BankBot.Coper.4404
Android.BankBot.Coper.4405
Android.BankBot.Coper.4406
Android.BankBot.Coper.4407
Android.BankBot.Coper.4408
Android.BankBot.Coper.4409
Android.BankBot.Coper.441
Android.BankBot.Coper.4411
Android.BankBot.Coper.4412
Android.BankBot.Coper.4413
Android.BankBot.Coper.4414
Android.BankBot.Coper.4415
Android.BankBot.Coper.4416
Android.BankBot.Coper.4417
Android.BankBot.Coper.4418
Android.BankBot.Coper.4419
Android.BankBot.Coper.442
Android.BankBot.Coper.4420
Android.BankBot.Coper.4421
Android.BankBot.Coper.4422
Android.BankBot.Coper.4423
Android.BankBot.Coper.4424
Android.BankBot.Coper.4425
Android.BankBot.Coper.4426
Android.BankBot.Coper.4427
Android.BankBot.Coper.4428
Android.BankBot.Coper.4429
Android.BankBot.Coper.443
Android.BankBot.Coper.4430
Android.BankBot.Coper.4431
Android.BankBot.Coper.4432
Android.BankBot.Coper.4433
Android.BankBot.Coper.4434
Android.BankBot.Coper.4435
Android.BankBot.Coper.4436
Android.BankBot.Coper.4437
Android.BankBot.Coper.4438
Android.BankBot.Coper.4439
Android.BankBot.Coper.444
Android.BankBot.Coper.4440
Android.BankBot.Coper.4441

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.