FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_MAINBOT.MCL aliases:

Name Vendor Dr.Web classification name
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.945
WORM_MAINBOT.MCL Trend Micro Trojan.Packed.418
WORM_MAINBOT.MCL Trend Micro Trojan.MulDrop.17431
WORM_MAINBOT.MCL Trend Micro Trojan.Inject.5485
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4687
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Rxbot.46
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4632
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4645
WORM_MAINBOT.MCL Trend Micro Trojan.Siggen.2093
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4922
WORM_MAINBOT.MCL Trend Micro Trojan.Inject.5354
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4593
WORM_MAINBOT.MCL Trend Micro Win32.HLLW.MyBot
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4536
WORM_MAINBOT.MCL Trend Micro Win32.HLLW.MyBot.based
WORM_MAINBOT.MCL Trend Micro Trojan.Siggen.2428
WORM_MAINBOT.MCL Trend Micro Win32.HLLW.SpyBot
WORM_MAINBOT.MCL Trend Micro Trojan.PWS.MSNPass.48
WORM_MAINBOT.MCL Trend Micro BackDoor.Bifrost.788
WORM_MAINBOT.MCL Trend Micro Trojan.Inject.3299
WORM_MAINBOT.MCL Trend Micro Trojan.MulDrop.32052
WORM_MAINBOT.MCL Trend Micro BackDoor.Siggen.699
WORM_MAINBOT.MCL Trend Micro Tool.PassView.117
WORM_MAINBOT.MCL Trend Micro Win32.HLLW.Autoruner.3712
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Wisdom
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.3762
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4775
WORM_MAINBOT.MCL Trend Micro Trojan.MulDrop.20009
WORM_MAINBOT.MCL Trend Micro Trojan.Inject.8348
WORM_MAINBOT.MCL Trend Micro Tool.PassView.123
WORM_MAINBOT.MCL Trend Micro BackDoor.Bifrost.24
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4590
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot
WORM_MAINBOT.MCL Trend Micro Trojan.Siggen1.5231
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.5227
WORM_MAINBOT.MCL Trend Micro Trojan.MulDrop.31882
WORM_MAINBOT.MCL Trend Micro Trojan.MulDrop.51143
WORM_MAINBOT.MCL Trend Micro Trojan.MulDrop.44926
WORM_MAINBOT.MCL Trend Micro BackDoor.Siggen.12930
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.4977
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Sdbot.5190
WORM_MAINBOT.MCL Trend Micro BackDoor.IRC.Bot.155
WORM_MAINBOT.MCL Trend Micro Win32.HLLW.Autoruner.10496
WORM_MAINBOT.MCL Trend Micro Trojan.Siggen.40141
WORM_MAINBOT.MCL Trend Micro Trojan.MulDrop.37314
WORM_MAINBOT.MCL Trend Micro Trojan.MulDrop.37781

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

Dr.Web © Doctor Web
2003 — 2022

Doctor Web is a Russian cybersecurity company focused on threat detection, prevention and response technologies.