FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Android.BankBot.Coper in virus library:

A family of banking trojans for Android devices. They have a modular architecture and various protective mechanisms to guard against their deletion. When targeted devices are infected, these bankers try to obtain access to the Accessibility Services functions that will allow them to perform all malicious actions without user interaction.

The Android.BankBot.Coper trojans are capable of:

  • executing USSD requests;
  • sending SMS;
  • intercepting SMS;
  • locking and unlocking the device screen;
  • intercepting and hiding push notifications;
  • displaying push notifications;
  • displaying phishing windows on top of the targeted applications interface;
  • intercepting the information typed on the keyboard (a keylogger functionality);
  • uninstalling apps upon C&C server command, and
  • uninstalling themselves from the infected device.

Android.BankBot.Coper in virus library:

Android.BankBot.Coper.1
Android.BankBot.Coper.100
Android.BankBot.Coper.1001
Android.BankBot.Coper.1002
Android.BankBot.Coper.1003
Android.BankBot.Coper.1004
Android.BankBot.Coper.1005
Android.BankBot.Coper.1006
Android.BankBot.Coper.1007
Android.BankBot.Coper.1008
Android.BankBot.Coper.1009
Android.BankBot.Coper.101
Android.BankBot.Coper.1010
Android.BankBot.Coper.1011
Android.BankBot.Coper.1012
Android.BankBot.Coper.1013
Android.BankBot.Coper.1014
Android.BankBot.Coper.1015
Android.BankBot.Coper.1016
Android.BankBot.Coper.1017
Android.BankBot.Coper.1018
Android.BankBot.Coper.1019
Android.BankBot.Coper.102
Android.BankBot.Coper.1020
Android.BankBot.Coper.1021
Android.BankBot.Coper.1022
Android.BankBot.Coper.1023
Android.BankBot.Coper.1024
Android.BankBot.Coper.1025
Android.BankBot.Coper.1026
Android.BankBot.Coper.1027
Android.BankBot.Coper.1028
Android.BankBot.Coper.1029
Android.BankBot.Coper.103
Android.BankBot.Coper.1030
Android.BankBot.Coper.1031
Android.BankBot.Coper.1032
Android.BankBot.Coper.1033
Android.BankBot.Coper.1034
Android.BankBot.Coper.1035
Android.BankBot.Coper.1036
Android.BankBot.Coper.1037
Android.BankBot.Coper.1038
Android.BankBot.Coper.1039
Android.BankBot.Coper.104
Android.BankBot.Coper.1041
Android.BankBot.Coper.1042
Android.BankBot.Coper.1043
Android.BankBot.Coper.1044
Android.BankBot.Coper.1045

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies