Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.BankBot.Coper in virus library:

A family of banking trojans for Android devices. They have a modular architecture and various protective mechanisms to guard against their deletion. When targeted devices are infected, these bankers try to obtain access to the Accessibility Services functions that will allow them to perform all malicious actions without user interaction.

The Android.BankBot.Coper trojans are capable of:

  • executing USSD requests;
  • sending SMS;
  • intercepting SMS;
  • locking and unlocking the device screen;
  • intercepting and hiding push notifications;
  • displaying push notifications;
  • displaying phishing windows on top of the targeted applications interface;
  • intercepting the information typed on the keyboard (a keylogger functionality);
  • uninstalling apps upon C&C server command, and
  • uninstalling themselves from the infected device.

Android.BankBot.Coper in virus library:

Android.BankBot.Coper.5245
Android.BankBot.Coper.5246
Android.BankBot.Coper.5247
Android.BankBot.Coper.5248
Android.BankBot.Coper.5249
Android.BankBot.Coper.525
Android.BankBot.Coper.5250
Android.BankBot.Coper.5251
Android.BankBot.Coper.5252
Android.BankBot.Coper.5253
Android.BankBot.Coper.5254
Android.BankBot.Coper.5255
Android.BankBot.Coper.5256
Android.BankBot.Coper.5257
Android.BankBot.Coper.5258
Android.BankBot.Coper.5259
Android.BankBot.Coper.526
Android.BankBot.Coper.5260
Android.BankBot.Coper.5261
Android.BankBot.Coper.5262
Android.BankBot.Coper.5263
Android.BankBot.Coper.5264
Android.BankBot.Coper.5265
Android.BankBot.Coper.5266
Android.BankBot.Coper.5267
Android.BankBot.Coper.5268
Android.BankBot.Coper.5269
Android.BankBot.Coper.527
Android.BankBot.Coper.5270
Android.BankBot.Coper.5271
Android.BankBot.Coper.5273
Android.BankBot.Coper.5274
Android.BankBot.Coper.5275
Android.BankBot.Coper.5276
Android.BankBot.Coper.5277
Android.BankBot.Coper.5278
Android.BankBot.Coper.5279
Android.BankBot.Coper.528
Android.BankBot.Coper.5280
Android.BankBot.Coper.5281
Android.BankBot.Coper.5282
Android.BankBot.Coper.5283
Android.BankBot.Coper.5284
Android.BankBot.Coper.5285
Android.BankBot.Coper.5286
Android.BankBot.Coper.5287
Android.BankBot.Coper.5288
Android.BankBot.Coper.5289
Android.BankBot.Coper.529
Android.BankBot.Coper.5290

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.