FOR CUSTOMERS

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Win32.HLLW.Sll 24.03.2006 --- Show
BackDoor.BlackHole.2004 23.03.2006 --- Show
BackDoor.Danton.40 23.03.2006 --- Show
BackDoor.Generic.1173 23.03.2006 --- Show
BackDoor.Generic.1303 23.03.2006 --- Show
BackDoor.Haxur 23.03.2006 --- Show
BackDoor.IRC.Sdbot.510 23.03.2006 --- Show
BackDoor.IRC.Sdbot.511 23.03.2006 --- Show
BackDoor.IRC.Sdbot.512 23.03.2006 --- Show
BackDoor.IRC.Sdbot.513 23.03.2006 --- Show
BackDoor.Iroffer.1247 23.03.2006 --- Show
BackDoor.Iroffer.1248 23.03.2006 --- Show
Tool.Autohack 23.03.2006 --- Show
Tool.Innosteel 23.03.2006 --- Show
Tool.Likun 23.03.2006 --- Show
Tool.Linklooker 23.03.2006 --- Show
Tool.Sfind 23.03.2006 --- Show
Tool.Upadmin.10 23.03.2006 --- Show
Tool.Upadmin.15 23.03.2006 --- Show
Trojan.Click.963 23.03.2006 --- Show
Trojan.DownLoader.7369 23.03.2006 --- Show
Trojan.DownLoader.7438 23.03.2006 --- Show
Trojan.DownLoader.7439 23.03.2006 --- Show
Trojan.DownLoader.7440 23.03.2006 --- Show
Trojan.DownLoader.7441 23.03.2006 --- Show
Trojan.DownLoader.7442 23.03.2006 --- Show
Trojan.DownLoader.7443 23.03.2006 --- Show
Trojan.DownLoader.7444 23.03.2006 --- Show
Trojan.DownLoader.7445 23.03.2006 --- Show
Trojan.DownLoader.7446 23.03.2006 --- Show
Trojan.DownLoader.7448 23.03.2006 --- Show
Trojan.DownLoader.7452 23.03.2006 --- Show
Trojan.DownLoader.7453 23.03.2006 --- Show
Trojan.DownLoader.7454 23.03.2006 --- Show
Trojan.DownLoader.7455 23.03.2006 --- Show
Trojan.DownLoader.7456 23.03.2006 --- Show
Trojan.DownLoader.7459 23.03.2006 --- Show
Trojan.DownLoader.7460 23.03.2006 --- Show
Trojan.DownLoader.7461 23.03.2006 --- Show
Trojan.DownLoader.7462 23.03.2006 --- Show
Trojan.DownLoader.7463 23.03.2006 --- Show
Trojan.DownLoader.7464 23.03.2006 --- Show
Trojan.DownLoader.7465 23.03.2006 --- Show
Trojan.DownLoader.7466 23.03.2006 --- Show
Trojan.Hooker.106 23.03.2006 --- Show
Trojan.Inject.62 23.03.2006 --- Show
Trojan.Ircos 23.03.2006 --- Show
Trojan.KeyLogger.423 23.03.2006 --- Show
Trojan.MulDrop.3401 23.03.2006 --- Show
Trojan.MulDrop.3403 23.03.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies