Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Spam-Mailbot.p aliases:

Name Vendor Dr.Web classification name
Spam-Mailbot.p McAfee Trojan.Spambot.4429
Spam-Mailbot.p McAfee Trojan.Hosts.102
Spam-Mailbot.p McAfee Trojan.Spambot.3531
Spam-Mailbot.p McAfee Trojan.Spambot.4465
Spam-Mailbot.p McAfee Trojan.Botnetlog.9
Spam-Mailbot.p McAfee Win32.HLLW.Autoruner.6865
Spam-Mailbot.p McAfee Trojan.Spambot.4555
Spam-Mailbot.p McAfee Trojan.Spambot.4490
Spam-Mailbot.p McAfee Trojan.PWS.Multi.35
Spam-Mailbot.p McAfee Trojan.Packed.687
Spam-Mailbot.p McAfee Trojan.Spambot.4557
Spam-Mailbot.p McAfee Trojan.DownLoad.40399
Spam-Mailbot.p McAfee Trojan.DownLoad.38666
Spam-Mailbot.p McAfee Trojan.PWS.LDPinch.4308
Spam-Mailbot.p McAfee Trojan.Botnetlog.11
Spam-Mailbot.p McAfee Trojan.DownLoad.38637
Spam-Mailbot.p McAfee Trojan.Spambot.4590
Spam-Mailbot.p McAfee Trojan.DownLoad.42082
Spam-Mailbot.p McAfee Trojan.WinSpy.173
Spam-Mailbot.p McAfee Win32.HLLW.Autoruner.6787
Spam-Mailbot.p McAfee BackDoor.Tdss.273
Spam-Mailbot.p McAfee Trojan.Spambot.4464
Spam-Mailbot.p McAfee Trojan.Inject.5685
Spam-Mailbot.p McAfee Trojan.Siggen.3029
Spam-Mailbot.p McAfee Trojan.DownLoad.45099
Spam-Mailbot.p McAfee BackDoor.Dax.47
Spam-Mailbot.p McAfee Trojan.Spambot.4564
Spam-Mailbot.p McAfee Trojan.Spambot.4567
Spam-Mailbot.p McAfee Trojan.Siggen.22299
Spam-Mailbot.p McAfee Trojan.Spambot.6052
Spam-Mailbot.p McAfee Trojan.Spambot.4765
Spam-Mailbot.p McAfee BackDoor.Tdss.1225
Spam-Mailbot.p McAfee Trojan.Spambot.6116
Spam-Mailbot.p McAfee Trojan.Spambot.4841
Spam-Mailbot.p McAfee Trojan.Siggen.7421

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.