Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor:Win32/Sdbot aliases:

Name Vendor Dr.Web classification name
Backdoor:Win32/Sdbot Microsoft Trojan.StartPage.1263
Backdoor:Win32/Sdbot Microsoft Trojan.PWS.Banker.1680
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.4636
Backdoor:Win32/Sdbot Microsoft BackDoor.Rescan
Backdoor:Win32/Sdbot Microsoft Trojan.MulDrop.3441
Backdoor:Win32/Sdbot Microsoft Trojan.MulDrop.3426
Backdoor:Win32/Sdbot Microsoft Trojan.DownLoader.10763
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.768
Backdoor:Win32/Sdbot Microsoft BackDoor.ScktComp
Backdoor:Win32/Sdbot Microsoft BackDoor.Talex.24
Backdoor:Win32/Sdbot Microsoft BackDoor.Talex
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.BlueBot
Backdoor:Win32/Sdbot Microsoft BackDoor.Huai
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Tongbot
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1219
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1221
Backdoor:Win32/Sdbot Microsoft BackDoor.Irrofer.1401
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1229
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1235
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1433
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1426
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.146
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1213
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1256
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1411
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1214
Backdoor:Win32/Sdbot Microsoft BackDoor.Iroffer.1413
Backdoor:Win32/Sdbot Microsoft Win32.IRC.Bot.based
Backdoor:Win32/Sdbot Microsoft Win32.HLLW.Shepher
Backdoor:Win32/Sdbot Microsoft Win32.HLLW.MyBot
Backdoor:Win32/Sdbot Microsoft BackDoor.Snart
Backdoor:Win32/Sdbot Microsoft BackDoor.EggDrop.1632
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.3153
Backdoor:Win32/Sdbot Microsoft Win32.IRC.Bot.86
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.269
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Aebot
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.JrxBot
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Turka
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.1372
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.2194
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.88
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.383
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Skynet.11
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.120
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.2714
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Sdbot.408
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Info
Backdoor:Win32/Sdbot Microsoft BackDoor.IRC.Cirilico

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.