FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader45.21229 00:19:44 02.10.2022 Show
Trojan.Inject4.44229 00:19:44 02.10.2022 Show
Trojan.MulDrop20.61013 00:19:42 02.10.2022 Show
Trojan.MulDrop20.60808 00:19:40 02.10.2022 Show
Trojan.DownLoader45.21496 00:19:39 02.10.2022 Show
Trojan.Siggen18.53041 00:19:38 02.10.2022 Show
Trojan.Inject4.44225 00:19:36 02.10.2022 Show
Trojan.Siggen18.52948 00:19:36 02.10.2022 Show
Trojan.Hosts.50500 00:19:33 02.10.2022 Show
Trojan.MulDrop20.60969 00:19:32 02.10.2022 Show
Trojan.DownLoader45.21298 00:19:31 02.10.2022 Show
Trojan.MulDrop20.60923 00:19:31 02.10.2022 Show
Trojan.MulDrop20.61003 00:19:29 02.10.2022 Show
Trojan.DownLoader45.21205 00:19:28 02.10.2022 Show
Trojan.MulDrop20.60747 00:19:27 02.10.2022 Show
Trojan.MulDrop20.60609 00:19:27 02.10.2022 Show
Trojan.Siggen18.52991 00:19:27 02.10.2022 Show
Trojan.Siggen18.52922 00:19:26 02.10.2022 Show
Trojan.MulDrop20.60637 00:19:26 02.10.2022 Show
Trojan.MulDrop20.60960 00:19:24 02.10.2022 Show
Trojan.DownLoader45.21419 00:19:23 02.10.2022 Show
Trojan.DownLoader45.21354 00:19:22 02.10.2022 Show
Trojan.PWS.Siggen3.22792 00:19:21 02.10.2022 Show
Trojan.Inject4.44291 00:19:20 02.10.2022 Show
Trojan.DownLoader45.21331 00:19:19 02.10.2022 Show
Trojan.MulDrop20.60738 00:19:19 02.10.2022 Show
Trojan.MulDrop20.60875 00:19:18 02.10.2022 Show
Trojan.DownLoader45.21252 00:19:18 02.10.2022 Show
Exploit.Siggen3.37384 00:19:17 02.10.2022 Show
Trojan.MulDrop20.60559 00:19:16 02.10.2022 Show
Trojan.Siggen18.52828 00:19:16 02.10.2022 Show
Trojan.Siggen18.53149 00:19:15 02.10.2022 Show
Trojan.DownLoader45.21344 00:19:14 02.10.2022 Show
Trojan.MulDrop20.60763 00:19:13 02.10.2022 Show
Trojan.Siggen18.52872 00:19:13 02.10.2022 Show
Trojan.MulDrop20.60999 00:19:05 02.10.2022 Show
Trojan.MulDrop20.60877 00:19:05 02.10.2022 Show
Trojan.MulDrop20.60892 00:19:03 02.10.2022 Show
Trojan.DownLoader45.21215 00:19:03 02.10.2022 Show
Trojan.DownLoader45.21396 00:19:00 02.10.2022 Show
Trojan.MulDrop20.60706 00:18:58 02.10.2022 Show
Trojan.MulDrop20.60888 00:18:57 02.10.2022 Show
Trojan.MulDrop20.60604 00:18:57 02.10.2022 Show
Trojan.Siggen18.52861 00:18:55 02.10.2022 Show
Trojan.MulDrop20.60601 00:18:55 02.10.2022 Show
Trojan.MulDrop20.60623 00:18:53 02.10.2022 Show
Trojan.MulDrop20.60651 00:18:52 02.10.2022 Show
Trojan.DownLoader45.21342 00:18:52 02.10.2022 Show
Trojan.DownLoader45.21266 00:18:51 02.10.2022 Show
Trojan.Siggen18.52839 00:18:49 02.10.2022 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies