FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.Inject4.44280 00:21:24 02.10.2022 Show
Trojan.MulDrop20.60558 00:21:23 02.10.2022 Show
Trojan.DownLoader45.21233 00:21:21 02.10.2022 Show
Trojan.MulDrop20.60739 00:21:19 02.10.2022 Show
Trojan.MulDrop20.60719 00:21:18 02.10.2022 Show
Trojan.Inject4.44255 00:21:18 02.10.2022 Show
Trojan.Siggen18.52954 00:21:16 02.10.2022 Show
Trojan.Siggen18.52871 00:21:16 02.10.2022 Show
Trojan.DownLoader45.21232 00:21:16 02.10.2022 Show
Trojan.MulDrop20.60588 00:21:14 02.10.2022 Show
Trojan.DownLoader45.21201 00:21:14 02.10.2022 Show
Trojan.DownLoader45.21345 00:21:13 02.10.2022 Show
Trojan.Siggen18.53006 00:21:12 02.10.2022 Show
Trojan.MulDrop20.60845 00:21:11 02.10.2022 Show
Trojan.Inject4.44206 00:21:09 02.10.2022 Show
Trojan.Hosts.50498 00:21:08 02.10.2022 Show
Trojan.Inject4.44216 00:21:07 02.10.2022 Show
Trojan.MulDrop20.60696 00:21:07 02.10.2022 Show
Trojan.Siggen18.53136 00:21:05 02.10.2022 Show
Trojan.DownLoader45.21381 00:21:05 02.10.2022 Show
Trojan.Inject4.44264 00:21:01 02.10.2022 Show
Trojan.Siggen18.52986 00:21:00 02.10.2022 Show
Trojan.MulDrop20.60948 00:20:58 02.10.2022 Show
Trojan.Siggen18.53115 00:20:58 02.10.2022 Show
Trojan.Siggen18.52860 00:20:57 02.10.2022 Show
Trojan.MulDrop20.60790 00:20:57 02.10.2022 Show
Trojan.MulDrop20.60630 00:20:56 02.10.2022 Show
Trojan.MulDrop20.60897 00:20:55 02.10.2022 Show
Exploit.Siggen3.37385 00:20:53 02.10.2022 Show
Trojan.Siggen18.52911 00:20:53 02.10.2022 Show
Trojan.MulDrop20.60602 00:20:51 02.10.2022 Show
Trojan.MulDrop20.60689 00:20:51 02.10.2022 Show
Trojan.MulDrop20.60510 00:20:50 02.10.2022 Show
Trojan.MulDrop20.60532 00:20:48 02.10.2022 Show
Trojan.PWS.Siggen3.22784 00:20:48 02.10.2022 Show
Trojan.Siggen18.52988 00:20:47 02.10.2022 Show
Trojan.MulDrop20.60707 00:20:45 02.10.2022 Show
Trojan.MulDrop20.60939 00:20:44 02.10.2022 Show
Trojan.Siggen18.52939 00:20:44 02.10.2022 Show
Trojan.MulDrop20.60776 00:20:44 02.10.2022 Show
Trojan.MulDrop20.60634 00:20:43 02.10.2022 Show
Trojan.PWS.Siggen3.22799 00:20:43 02.10.2022 Show
Trojan.DownLoader45.21423 00:20:42 02.10.2022 Show
Trojan.DownLoader45.21435 00:20:38 02.10.2022 Show
Trojan.DownLoader45.21316 00:20:37 02.10.2022 Show
Trojan.MulDrop20.60950 00:20:37 02.10.2022 Show
Trojan.Siggen18.53120 00:20:37 02.10.2022 Show
Trojan.MulDrop20.60593 00:20:36 02.10.2022 Show
Trojan.MulDrop20.60864 00:20:35 02.10.2022 Show
Trojan.Inject4.44271 00:20:35 02.10.2022 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies