Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Bloodhound.Morphine aliases:

Name Vendor Dr.Web classification name
Bloodhound.Morphine Symantec Trojan.Troll
Bloodhound.Morphine Symantec Trojan.MulDrop.433
Bloodhound.Morphine Symantec BackDoor.IRC.based
Bloodhound.Morphine Symantec BackDoor.Funmaker
Bloodhound.Morphine Symantec BackDoor.IRC.Sdbot
Bloodhound.Morphine Symantec BackDoor.IRC.Sdbot.157
Bloodhound.Morphine Symantec Trojan.Isbar.241
Bloodhound.Morphine Symantec Trojan.LowZones.110
Bloodhound.Morphine Symantec BackDoor.Punt
Bloodhound.Morphine Symantec Trojan.Firedaemon
Bloodhound.Morphine Symantec Trojan.PWS.Vipgsm
Bloodhound.Morphine Symantec Trojan.KeyLogger.226
Bloodhound.Morphine Symantec BackDoor.Servu.4004
Bloodhound.Morphine Symantec BackDoor.Servu.5200
Bloodhound.Morphine Symantec Win32.HLLW.Agobot
Bloodhound.Morphine Symantec Win32.HLLM.MyDoom.based
Bloodhound.Morphine Symantec Trojan.DownLoader.2836
Bloodhound.Morphine Symantec BackDoor.Theef.201
Bloodhound.Morphine Symantec Trojan.Unremote
Bloodhound.Morphine Symantec BackDoor.Bifrost
Bloodhound.Morphine Symantec BackDoor.Pigeon.56
Bloodhound.Morphine Symantec BackDoor.Servu.4103
Bloodhound.Morphine Symantec BackDoor.Servu.5009
Bloodhound.Morphine Symantec BackDoor.Servu.5004
Bloodhound.Morphine Symantec BackDoor.WinShell.50
Bloodhound.Morphine Symantec Exploit.Sfind
Bloodhound.Morphine Symantec BackDoor.Servu.50011
Bloodhound.Morphine Symantec BackDoor.Servu.41
Bloodhound.Morphine Symantec Trojan.Logg
Bloodhound.Morphine Symantec BackDoor.HackDef.100
Bloodhound.Morphine Symantec Trojan.MulDrop.2602
Bloodhound.Morphine Symantec Win32.HLLW.SpyBot
Bloodhound.Morphine Symantec BackDoor.IRC.Sdbot.89
Bloodhound.Morphine Symantec BackDoor.IRC.Sdbot.228
Bloodhound.Morphine Symantec BackDoor.Servu.30
Bloodhound.Morphine Symantec BackDoor.Servu.40
Bloodhound.Morphine Symantec Trojan.MulDrop.1127
Bloodhound.Morphine Symantec Win32.Parite.2
Bloodhound.Morphine Symantec BackDoor.Servu.4100
Bloodhound.Morphine Symantec BackDoor.Servu.5201
Bloodhound.Morphine Symantec BackDoor.Servu.221
Bloodhound.Morphine Symantec BackDoor.HackDef.84
Bloodhound.Morphine Symantec BackDoor.Pigeon.15
Bloodhound.Morphine Symantec IRC.Flood
Bloodhound.Morphine Symantec BackDoor.Pigeon.52
Bloodhound.Morphine Symantec Trojan.PWS.Mof
Bloodhound.Morphine Symantec Trojan.PWS.GWGhost.26
Bloodhound.Morphine Symantec Trojan.Ranky
Bloodhound.Morphine Symantec Win32.HLLW.MyBot.based
Bloodhound.Morphine Symantec Win32.IRC.Bot.based

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.