Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

WORM_SDBOT.GEN aliases:

Name Vendor Dr.Web classification name
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Amaru
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.285
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.224
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Anime
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Agobot.2
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Slot
WORM_SDBOT.GEN Trend Micro Trojan.Proxy.251
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Transistor
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.75
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.338
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Vegas
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.230
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.229
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Scanbot
WORM_SDBOT.GEN Trend Micro BackDoor.Iroffer.13
WORM_SDBOT.GEN Trend Micro Win32.HLLW.SpyBot.18
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Xbot
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.414
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Juggalo
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Jrbot
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Mhigbot
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.225
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.52
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.246
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Scanbot.3
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Buhbot
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Randex
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Scanbot.11
WORM_SDBOT.GEN Trend Micro BackDoor.Spyboter
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Downight
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Anite
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.5
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.260
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.259
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Zombot.2
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Polybot
WORM_SDBOT.GEN Trend Micro Win32.HLLW.SpyBot
WORM_SDBOT.GEN Trend Micro Win32.HLLW.Agobot.3
WORM_SDBOT.GEN Trend Micro Win32.HLLM.Dref
WORM_SDBOT.GEN Trend Micro Win32.HLLW.MyBot.based
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.380
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.JrxBot
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Baka
WORM_SDBOT.GEN Trend Micro Trojan.Proxy.165
WORM_SDBOT.GEN Trend Micro Win32.HLLW.ForBot
WORM_SDBOT.GEN Trend Micro Trojan.DownLoader.3220
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.289
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.325
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sbot.22
WORM_SDBOT.GEN Trend Micro BackDoor.IRC.Sdbot.71

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.