Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Worm:Win32/Rebhip.A aliases:

Name Vendor Dr.Web classification name
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.SpyNet.2
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.Autoruner.14812
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.Autoruner.16242
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.SpyNet.8
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.Autoruner.26105
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.27681
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.13114
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.40396
Worm:Win32/Rebhip.A Microsoft Trojan.MulDrop1.46416
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.3631
Worm:Win32/Rebhip.A Microsoft Trojan.Packed.21243
Worm:Win32/Rebhip.A Microsoft Trojan.MulDrop1.51871
Worm:Win32/Rebhip.A Microsoft BackDoor.Cybergate.1
Worm:Win32/Rebhip.A Microsoft Trojan.Siggen1.63512
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.14206
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.3774
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.29802
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.12188
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.Autoruner.25074
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.40140
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.38285
Worm:Win32/Rebhip.A Microsoft Trojan.MulDrop1.48797
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.39852
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.SpyNet
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.Autoruner.36241
Worm:Win32/Rebhip.A Microsoft Trojan.MulDrop1.49717
Worm:Win32/Rebhip.A Microsoft Trojan.AVKill.2880
Worm:Win32/Rebhip.A Microsoft Trojan.Siggen.29796
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.12116
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.14423
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.15297
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.14181
Worm:Win32/Rebhip.A Microsoft Trojan.MulDrop1.55312
Worm:Win32/Rebhip.A Microsoft Trojan.Siggen2.16298
Worm:Win32/Rebhip.A Microsoft BackDoor.IRC.Sdbot.3840
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.27675
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.28067
Worm:Win32/Rebhip.A Microsoft Trojan.Siggen1.60736
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.11373
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.13121
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.12343
Worm:Win32/Rebhip.A Microsoft Trojan.MulDrop1.54101
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.11338
Worm:Win32/Rebhip.A Microsoft Win32.HLLW.Autoruner.24970
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.13922
Worm:Win32/Rebhip.A Microsoft Trojan.Inject.15324
Worm:Win32/Rebhip.A Microsoft Trojan.DownLoader1.39843
Worm:Win32/Rebhip.A Microsoft Trojan.MulDrop1.53855
Worm:Win32/Rebhip.A Microsoft Trojan.AVKill.2
Worm:Win32/Rebhip.A Microsoft BackDoor.Poison.7699

1 2

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.