Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

W32.IRCBot aliases:

Name Vendor Dr.Web classification name
W32.IRCBot Symantec Win32.HLLW.Gammes
W32.IRCBot Symantec BackDoor.IRC.Sdbot.335
W32.IRCBot Symantec BackDoor.Tsunami
W32.IRCBot Symantec BackDoor.IrcContact.20
W32.IRCBot Symantec BackDoor.Hsbot.11
W32.IRCBot Symantec Trojan.Keylog
W32.IRCBot Symantec BackDoor.Generic.498
W32.IRCBot Symantec BackDoor.Generic.606
W32.IRCBot Symantec Win32.HLLW.Deadaim
W32.IRCBot Symantec Win32.HLLW.Edbot
W32.IRCBot Symantec BackDoor.IRC.Nazgul
W32.IRCBot Symantec Win32.HLLM.Breatle
W32.IRCBot Symantec Trojan.DownLoader.3475
W32.IRCBot Symantec BackDoor.Pmcat
W32.IRCBot Symantec BackDoor.Generic.85
W32.IRCBot Symantec BackDoor.Cskeys
W32.IRCBot Symantec BackDoor.IRC.Ads
W32.IRCBot Symantec BackDoor.IRC.Drix
W32.IRCBot Symantec BackDoor.Aphex.10
W32.IRCBot Symantec BackDoor.IRC.Agemo
W32.IRCBot Symantec BackDoor.IRC.Sdbot.236
W32.IRCBot Symantec Win32.HLLW.Shodan.11
W32.IRCBot Symantec BackDoor.IRC.Sdbot.138
W32.IRCBot Symantec BackDoor.IRC.Cirilico
W32.IRCBot Symantec BackDoor.IRC.Brepibot
W32.IRCBot Symantec BackDoor.IRC.Sdbot.98
W32.IRCBot Symantec BackDoor.IRC.Dbot
W32.IRCBot Symantec BackDoor.Redkod.14
W32.IRCBot Symantec BackDoor.PR.100
W32.IRCBot Symantec BackDoor.IRC.Scnbot
W32.IRCBot Symantec DDoS.Kaiten
W32.IRCBot Symantec Win32.HLLW.Agobot.3
W32.IRCBot Symantec DDoS.Kaiten.57345
W32.IRCBot Symantec Win32.HLLW.Fubot
W32.IRCBot Symantec BackDoor.IRC.Morda
W32.IRCBot Symantec BackDoor.Neobot
W32.IRCBot Symantec BackDoor.IRC.Botty
W32.IRCBot Symantec BackDoor.BlueEye.20
W32.IRCBot Symantec Win32.HLLM.Soks
W32.IRCBot Symantec Win32.HLLW.Matos
W32.IRCBot Symantec BackDoor.IRC.Sdbot.251
W32.IRCBot Symantec BackDoor.IRC.Baka
W32.IRCBot Symantec BackDoor.Subhuman
W32.IRCBot Symantec BackDoor.IRC.Sdbot.315
W32.IRCBot Symantec BackDoor.IRC.Sdbot.300
W32.IRCBot Symantec BackDoor.IRC.Sdbot.301
W32.IRCBot Symantec Win32.HLLW.Shepher
W32.IRCBot Symantec BackDoor.IRC.Xbot
W32.IRCBot Symantec BackDoor.IRC.Sdbot.319
W32.IRCBot Symantec BackDoor.IRC.Sdbot.99

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.