Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Packer.Enigma.B aliases:

Name Vendor Dr.Web classification name
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.1458
Packer.Enigma.B BitDefender Trojan.Spambot
Packer.Enigma.B BitDefender Trojan.Inject.549
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.577
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.837
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.838
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.819
Packer.Enigma.B BitDefender Trojan.DownLoader.57643
Packer.Enigma.B BitDefender Trojan.MulDrop.2220
Packer.Enigma.B BitDefender Win32.HLLW.Gavir.101
Packer.Enigma.B BitDefender BackDoor.IRC.Mixed
Packer.Enigma.B BitDefender Trojan.DownLoader.5270
Packer.Enigma.B BitDefender BackDoor.Bifrost.67
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.899
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.830
Packer.Enigma.B BitDefender BackDoor.Bandook.30
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.1976
Packer.Enigma.B BitDefender BackDoor.Pigeon.9132
Packer.Enigma.B BitDefender Trojan.MulDrop.8864
Packer.Enigma.B BitDefender BackDoor.DarkMoon.131
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.798
Packer.Enigma.B BitDefender BackDoor.ProRat.252
Packer.Enigma.B BitDefender BackDoor.GSpot.22
Packer.Enigma.B BitDefender BackDoor.Turkojan.20
Packer.Enigma.B BitDefender Trojan.PWS.SpySoft.33
Packer.Enigma.B BitDefender Trojan.KeyLogger.603
Packer.Enigma.B BitDefender BackDoor.Optix.168
Packer.Enigma.B BitDefender Win32.HLLW.MyBot.based
Packer.Enigma.B BitDefender Win32.HLLM.MyDoom.based
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.809
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.816
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.806
Packer.Enigma.B BitDefender BackDoor.Graybird.2016
Packer.Enigma.B BitDefender BackDoor.Bifrost
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.933
Packer.Enigma.B BitDefender Trojan.MulDrop.12718
Packer.Enigma.B BitDefender Trojan.KeyLogger.1904
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.2129
Packer.Enigma.B BitDefender Trojan.Troll
Packer.Enigma.B BitDefender BackDoor.Iroffer.1427
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.752
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.1147
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.based
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.2135
Packer.Enigma.B BitDefender Trojan.DownLoader.52302
Packer.Enigma.B BitDefender Win32.HLLW.Autoruner.1720
Packer.Enigma.B BitDefender Trojan.DownLoader.56576
Packer.Enigma.B BitDefender BackDoor.IRC.Sdbot.2861
Packer.Enigma.B BitDefender BackDoor.Generic.204
Packer.Enigma.B BitDefender BackDoor.ProRat.104

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.