Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

IRC Trojan aliases:

Name Vendor Dr.Web classification name
IRC Trojan Symantec Trojan.Sockets
IRC Trojan Symantec Trojan.Xdark
IRC Trojan Symantec Win32.HLLW.Warm.1
IRC Trojan Symantec Tool.Prockill
IRC Trojan Symantec Tool.SetTime
IRC Trojan Symantec Trojan.MulDrop.517
IRC Trojan Symantec Trojan.MulDrop.1230
IRC Trojan Symantec Trojan.MulDrop.2579
IRC Trojan Symantec BackDoor.Salle
IRC Trojan Symantec Trojan.MulDrop.704
IRC Trojan Symantec Trojan.Sporkeh
IRC Trojan Symantec Trojan.MulDrop.1215
IRC Trojan Symantec Trojan.MulDrop.1216
IRC Trojan Symantec Win32.HLLW.AzurBot
IRC Trojan Symantec Trojan.DownLoader.913
IRC Trojan Symantec Trojan.MulDrop.1078
IRC Trojan Symantec BackDoor.Ioftpd
IRC Trojan Symantec BackDoor.IRC.Banned
IRC Trojan Symantec Trojan.MulDrop.1000
IRC Trojan Symantec Trojan.Noshare
IRC Trojan Symantec Trojan.MulDrop.628
IRC Trojan Symantec BackDoor.Nocdpa
IRC Trojan Symantec BackDoor.IRC.ABC.16384
IRC Trojan Symantec BackDoor.Generic.737
IRC Trojan Symantec Trojan.MulDrop.467
IRC Trojan Symantec Trojan.Odes
IRC Trojan Symantec BackDoor.Notcsd
IRC Trojan Symantec Win32.HLLM.Generic.220
IRC Trojan Symantec BackDoor.Warten
IRC Trojan Symantec BackDoor.Asterix
IRC Trojan Symantec BackDoor.Light
IRC Trojan Symantec BackDoor.Hx.10
IRC Trojan Symantec BackDoor.Generic.85
IRC Trojan Symantec BackDoor.Generic.86
IRC Trojan Symantec BackDoor.Generic.165
IRC Trojan Symantec BackDoor.Generic.206
IRC Trojan Symantec BackDoor.Generic.87
IRC Trojan Symantec BackDoor.Wergser
IRC Trojan Symantec BackDoor.Cskeys
IRC Trojan Symantec Trojan.MulDrop.31
IRC Trojan Symantec BackDoor.Weedbot.10
IRC Trojan Symantec Trojan.Fidject.1
IRC Trojan Symantec BackDoor.IRC.Critical
IRC Trojan Symantec FDOS.Nenet
IRC Trojan Symantec Trojan.Sennaspy
IRC Trojan Symantec BackDoor.Yuliho
IRC Trojan Symantec BackDoor.IRC.Newpot
IRC Trojan Symantec BackDoor.IRC.Ads
IRC Trojan Symantec Trojan.MulDrop.282
IRC Trojan Symantec BackDoor.Psychward

1 2 3 4 5 6 7 8 9

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.