Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.BankBot.Coper in virus library:

A family of banking trojans for Android devices. They have a modular architecture and various protective mechanisms to guard against their deletion. When targeted devices are infected, these bankers try to obtain access to the Accessibility Services functions that will allow them to perform all malicious actions without user interaction.

The Android.BankBot.Coper trojans are capable of:

  • executing USSD requests;
  • sending SMS;
  • intercepting SMS;
  • locking and unlocking the device screen;
  • intercepting and hiding push notifications;
  • displaying push notifications;
  • displaying phishing windows on top of the targeted applications interface;
  • intercepting the information typed on the keyboard (a keylogger functionality);
  • uninstalling apps upon C&C server command, and
  • uninstalling themselves from the infected device.

Android.BankBot.Coper in virus library:

Android.BankBot.Coper.1431
Android.BankBot.Coper.1432
Android.BankBot.Coper.1433
Android.BankBot.Coper.1434
Android.BankBot.Coper.1435
Android.BankBot.Coper.1436
Android.BankBot.Coper.1437
Android.BankBot.Coper.1438
Android.BankBot.Coper.1439
Android.BankBot.Coper.1440
Android.BankBot.Coper.1441
Android.BankBot.Coper.1442
Android.BankBot.Coper.1443
Android.BankBot.Coper.1444
Android.BankBot.Coper.1445
Android.BankBot.Coper.1446
Android.BankBot.Coper.1447
Android.BankBot.Coper.1448
Android.BankBot.Coper.1449
Android.BankBot.Coper.1450
Android.BankBot.Coper.1451
Android.BankBot.Coper.1452
Android.BankBot.Coper.1453
Android.BankBot.Coper.1454
Android.BankBot.Coper.1455
Android.BankBot.Coper.1456
Android.BankBot.Coper.1457
Android.BankBot.Coper.1458
Android.BankBot.Coper.1459
Android.BankBot.Coper.1460
Android.BankBot.Coper.1461
Android.BankBot.Coper.1462
Android.BankBot.Coper.1463
Android.BankBot.Coper.1464
Android.BankBot.Coper.1465
Android.BankBot.Coper.1466
Android.BankBot.Coper.1467
Android.BankBot.Coper.1468
Android.BankBot.Coper.1469
Android.BankBot.Coper.1470
Android.BankBot.Coper.1471
Android.BankBot.Coper.1472
Android.BankBot.Coper.1473
Android.BankBot.Coper.1474
Android.BankBot.Coper.1475
Android.BankBot.Coper.1476
Android.BankBot.Coper.1477
Android.BankBot.Coper.1478
Android.BankBot.Coper.1479
Android.BankBot.Coper.1480

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.