Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Win32.IRCBot.gen in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Win32.IRCBot.gen aliases:

Name Vendor Dr.Web classification name
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.4585
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.4585
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Riot.1
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Unkbot.77
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Unkbot.77
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Unkbot.104
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Unkbot.104
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Unkbot.78
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.Bifrost.909
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.Bifrost.909
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.Oscar
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.775
Backdoor.Win32.IRCBot.gen Kaspersky Trojan.MulDrop.12358
Backdoor.Win32.IRCBot.gen VirusBlokAda Win32.HLLW.Woned
Backdoor.Win32.IRCBot.gen VirusBlokAda Win32.HLLW.Voumit
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot
Backdoor.Win32.IRCBot.gen VirusBlokAda Win32.HLLW.SpyBot.15
Backdoor.Win32.IRCBot.gen VirusBlokAda Trojan.MulDrop.3053
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.390
Backdoor.Win32.IRCBot.gen Kaspersky Win32.HLLW.MyBot.6
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Unkbot.128
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Unkbot.128
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Moale.17
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Moale.17
Backdoor.Win32.IRCBot.gen Kaspersky Win32.HLLW.MyBot.37
Backdoor.Win32.IRCBot.gen VirusBlokAda Win32.HLLW.MyBot.37
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.4785
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.4785
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.4786
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.4786
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.1723
Backdoor.Win32.IRCBot.gen VirusBlokAda Trojan.MulDrop.12389
Backdoor.Win32.IRCBot.gen VirusBlokAda Trojan.MulDrop.27760
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Unkbot.19
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Unkbot.19
Backdoor.Win32.IRCBot.gen Kaspersky Win32.HLLW.MyBot.46
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.4864
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.4864
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.4866
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.4866
Backdoor.Win32.IRCBot.gen VirusBlokAda Trojan.Packed.469
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.4004
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.4004
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Bot.141
Backdoor.Win32.IRCBot.gen VirusBlokAda BackDoor.IRC.Sdbot.5
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.1420
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.4851
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Sdbot.4921
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.Bifrost.57
Backdoor.Win32.IRCBot.gen Kaspersky BackDoor.IRC.Unkbot.148

1 2 3 4 5 6 7 8 9 10 11 12

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.