Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Trojan.DownLoader45.35652 00:11:44 01.12.2022 Show
Trojan.MulDrop21.18379 00:11:43 01.12.2022 Show
Trojan.DownLoader45.35610 00:11:43 01.12.2022 Show
Trojan.Siggen19.15118 00:11:43 01.12.2022 Show
Exploit.Siggen3.38411 00:11:43 01.12.2022 Show
Trojan.MulDrop21.18421 00:11:43 01.12.2022 Show
Trojan.Siggen19.15147 00:11:43 01.12.2022 Show
Trojan.Siggen19.14983 00:11:43 01.12.2022 Show
Trojan.MulDrop21.18440 00:11:43 01.12.2022 Show
Trojan.MulDrop21.18441 00:11:43 01.12.2022 Show
Trojan.Siggen19.14974 00:11:43 01.12.2022 Show
Trojan.DownLoader45.35562 00:11:43 01.12.2022 Show
Trojan.DownLoader45.35704 00:11:43 01.12.2022 Show
Exploit.Siggen3.38427 00:11:42 01.12.2022 Show
Trojan.DownLoader45.35467 00:11:42 01.12.2022 Show
Trojan.Siggen19.15168 00:11:42 01.12.2022 Show
Trojan.Siggen19.15169 00:11:42 01.12.2022 Show
Trojan.DownLoader45.35702 00:11:42 01.12.2022 Show
Trojan.Siggen19.15121 00:11:42 01.12.2022 Show
Trojan.Siggen19.14902 00:11:41 01.12.2022 Show
Trojan.MulDrop21.18470 00:11:41 01.12.2022 Show
Trojan.Siggen19.14805 00:11:41 01.12.2022 Show
Trojan.MulDrop21.18367 00:11:41 01.12.2022 Show
Trojan.MulDrop21.18474 00:11:41 01.12.2022 Show
Trojan.DownLoader45.35549 00:11:41 01.12.2022 Show
Trojan.DownLoader45.35557 00:11:40 01.12.2022 Show
Trojan.Siggen19.15338 00:11:40 01.12.2022 Show
Trojan.Siggen19.14978 00:11:40 01.12.2022 Show
Trojan.Siggen19.15022 00:11:40 01.12.2022 Show
Trojan.Inject4.47502 00:11:38 01.12.2022 Show
Trojan.DownLoader45.35507 00:11:38 01.12.2022 Show
Trojan.MulDrop21.18479 00:11:38 01.12.2022 Show
Trojan.MulDrop21.18296 00:11:37 01.12.2022 Show
Trojan.MulDrop21.18539 00:11:37 01.12.2022 Show
Trojan.MulDrop21.18394 00:11:37 01.12.2022 Show
Trojan.MulDrop21.18428 00:11:37 01.12.2022 Show
Trojan.Siggen19.15239 00:11:36 01.12.2022 Show
Trojan.MulDrop21.18324 00:11:36 01.12.2022 Show
Trojan.MulDrop21.18385 00:11:36 01.12.2022 Show
Trojan.MulDrop21.18387 00:11:35 01.12.2022 Show
Trojan.Siggen19.15256 00:11:34 01.12.2022 Show
Trojan.DownLoader45.35700 00:11:34 01.12.2022 Show
Trojan.Siggen19.15740 00:11:34 01.12.2022 Show
Trojan.MulDrop21.18268 00:11:34 01.12.2022 Show
Trojan.SpyBot.1158 00:11:33 01.12.2022 Show
Trojan.MulDrop21.18609 00:11:33 01.12.2022 Show
Trojan.MulDrop21.18575 00:11:33 01.12.2022 Show
Trojan.DownLoader45.35560 00:11:33 01.12.2022 Show
Trojan.Siggen19.14915 00:11:30 01.12.2022 Show
Trojan.Inject4.47505 00:11:30 01.12.2022 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.

© Doctor Web
2003 — 2022

Doctor Web is a cybersecurity company focused on threat detection, prevention and response technologies