Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Backdoor.Win32.VanBot.ax in virus library:

A class of malware that can execute commands from a remote server and allow attackers to remotely control an infected device.

Backdoor.Win32.VanBot.ax aliases:

Name Vendor Dr.Web classification name
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.945
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.1464
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2665
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.945
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2665
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2556
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2569
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2550
Backdoor.Win32.VanBot.ax Kaspersky Win32.HLLW.MyBot
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot
Backdoor.Win32.VanBot.ax Kaspersky Trojan.Packed.162
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2844
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2535
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.3131
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2570
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.1464
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2547
Backdoor.Win32.VanBot.ax VirusBlokAda Win32.HLLW.MyBot
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2600
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2596
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2593
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2595
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2594
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2597
Backdoor.Win32.VanBot.ax Kaspersky Trojan.DownLoader.47173
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2575
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2573
Backdoor.Win32.VanBot.ax Kaspersky Trojan.DownLoader.47412
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2514
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2540
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2560
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2527
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2533
Backdoor.Win32.VanBot.ax Kaspersky Trojan.DownLoader.46812
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.853
Backdoor.Win32.VanBot.ax VirusBlokAda Trojan.Packed.162
Backdoor.Win32.VanBot.ax Kaspersky Trojan.Inject.283
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2513
Backdoor.Win32.VanBot.ax Kaspersky BackDoor.IRC.Sdbot.2998
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2998
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2119
Backdoor.Win32.VanBot.ax VirusBlokAda Trojan.DownLoader.47391
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.3519
Backdoor.Win32.VanBot.ax VirusBlokAda Trojan.DownLoader.47161
Backdoor.Win32.VanBot.ax VirusBlokAda Trojan.DownLoader.47411
Backdoor.Win32.VanBot.ax VirusBlokAda Trojan.DownLoader.47409
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2547
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2533
Backdoor.Win32.VanBot.ax VirusBlokAda BackDoor.IRC.Sdbot.2543

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.