Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

BKDR_Generic aliases:

Name Vendor Dr.Web classification name
BKDR_Generic Trend Micro Trojan.MulDrop.21102
BKDR_Generic Trend Micro BackDoor.BioNet.310
BKDR_Generic Trend Micro BackDoor.EggDrop.127
BKDR_Generic Trend Micro BackDoor.Xbak
BKDR_Generic Trend Micro BackDoor.Generic.1319
BKDR_Generic Trend Micro Trojan.DownLoad1.43150
BKDR_Generic Trend Micro BackDoor.Nuclear.49
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.1988
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.654
BKDR_Generic Trend Micro BackDoor.Skd.20
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.3111
BKDR_Generic Trend Micro Trojan.Konsocks.9
BKDR_Generic Trend Micro Win32.HLLW.MyBot.5802
BKDR_Generic Trend Micro Trojan.Inject.778
BKDR_Generic Trend Micro Win32.HLLW.MyBot.233
BKDR_Generic Trend Micro BackDoor.Pigeon.15035
BKDR_Generic Trend Micro BackDoor.Pigeon.6141
BKDR_Generic Trend Micro BackDoor.Pigeon.13299
BKDR_Generic Trend Micro Win32.HLLW.Nope
BKDR_Generic Trend Micro Trojan.Stius
BKDR_Generic Trend Micro Trojan.LAspy
BKDR_Generic Trend Micro Trojan.PWS.LDPinch.1130
BKDR_Generic Trend Micro BackDoor.WinFire.12
BKDR_Generic Trend Micro BackDoor.Tibic
BKDR_Generic Trend Micro Trojan.MulDrop.4527
BKDR_Generic Trend Micro Trojan.PWS.Gamania.12323
BKDR_Generic Trend Micro BackDoor.Recon.20
BKDR_Generic Trend Micro BackDoor.Jorge
BKDR_Generic Trend Micro Trojan.MulDrop.16473
BKDR_Generic Trend Micro BackDoor.Woaisini.2
BKDR_Generic Trend Micro BackDoor.Graybird.2037
BKDR_Generic Trend Micro BackDoor.Beizhu.1067
BKDR_Generic Trend Micro Trojan.KeyLogger.1469
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.831
BKDR_Generic Trend Micro Trojan.PWS.Banker.24367
BKDR_Generic Trend Micro Trojan.DownLoader.51009
BKDR_Generic Trend Micro BackDoor.Outbreak.23
BKDR_Generic Trend Micro BackDoor.Generic.1009
BKDR_Generic Trend Micro Trojan.DownLoader.21028
BKDR_Generic Trend Micro BackDoor.IRC.Sdbot.667
BKDR_Generic Trend Micro BackDoor.Pigeon.24577
BKDR_Generic Trend Micro Trojan.MulDrop.12181
BKDR_Generic Trend Micro BackDoor.Rtkit.12
BKDR_Generic Trend Micro BackDoor.Beizhu.1001
BKDR_Generic Trend Micro BackDoor.Huai.981
BKDR_Generic Trend Micro Trojan.Ugly.29378
BKDR_Generic Trend Micro Trojan.DownLoader.54645
BKDR_Generic Trend Micro Trojan.MulDrop.13070
BKDR_Generic Trend Micro BackDoor.Tiny.35
BKDR_Generic Trend Micro BackDoor.Civet

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.