Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.Packed.60199 15:21:40 13.04.2026 Show
Android.DownLoader.5789 15:10:07 13.04.2026 Show
Android.Packed.60200 14:26:24 13.04.2026 Show
Android.MobiDash.9641 06:24:18 12.04.2026 Show
Android.Harly.107 06:13:22 13.04.2026 Show
Android.BankBot.Ermac.243 05:22:22 13.04.2026 Show
Trojan.MulDrop36.65169 03:05:08 13.04.2026 Show
Trojan.MulDrop37.768 03:05:08 13.04.2026 Show
Trojan.Inject6.36023 03:05:08 13.04.2026 Show
Trojan.Inject6.35969 03:05:08 13.04.2026 Show
Trojan.MulDrop36.64791 03:05:08 13.04.2026 Show
Trojan.MulDrop37.389 03:05:08 13.04.2026 Show
Trojan.MulDrop37.562 03:05:08 13.04.2026 Show
Trojan.MulDrop36.65182 03:05:08 13.04.2026 Show
Trojan.MulDrop37.521 03:05:08 13.04.2026 Show
Trojan.MulDrop36.65177 03:05:08 13.04.2026 Show
Trojan.MulDrop37.315 03:05:08 13.04.2026 Show
Trojan.MulDrop36.65062 03:05:08 13.04.2026 Show
Trojan.MulDrop37.500 03:05:08 13.04.2026 Show
Trojan.Inject6.36010 03:05:08 13.04.2026 Show
Trojan.MulDrop37.127 03:05:07 13.04.2026 Show
Trojan.MulDrop37.309 03:05:07 13.04.2026 Show
Trojan.MulDrop37.817 03:05:07 13.04.2026 Show
Trojan.MulDrop36.64717 03:05:07 13.04.2026 Show
Trojan.MulDrop37.83 03:05:07 13.04.2026 Show
Trojan.Inject6.35985 03:05:07 13.04.2026 Show
Trojan.Inject6.35937 03:05:06 13.04.2026 Show
Trojan.MulDrop37.666 03:05:06 13.04.2026 Show
Trojan.MulDrop37.153 03:05:06 13.04.2026 Show
Trojan.MulDrop37.354 03:05:06 13.04.2026 Show
Trojan.MulDrop36.64909 03:05:06 13.04.2026 Show
Trojan.MulDrop37.268 03:05:06 13.04.2026 Show
Trojan.MulDrop37.499 03:05:05 13.04.2026 Show
Trojan.MulDrop36.65423 03:05:05 13.04.2026 Show
Trojan.MulDrop36.65484 03:05:05 13.04.2026 Show
Trojan.MulDrop36.64569 03:05:05 13.04.2026 Show
Trojan.MulDrop36.64876 03:05:05 13.04.2026 Show
Trojan.Inject6.35833 03:05:05 13.04.2026 Show
Trojan.Inject6.35998 03:05:05 13.04.2026 Show
Trojan.Siggen32.33278 03:05:05 13.04.2026 Show
Trojan.MulDrop37.464 03:05:05 13.04.2026 Show
Trojan.MulDrop36.65184 03:05:05 13.04.2026 Show
Trojan.MulDrop36.65117 03:05:04 13.04.2026 Show
Trojan.MulDrop37.665 03:05:04 13.04.2026 Show
Trojan.MulDrop36.64761 03:05:04 13.04.2026 Show
Trojan.MulDrop36.64946 03:05:04 13.04.2026 Show
Trojan.MulDrop37.360 03:05:04 13.04.2026 Show
Trojan.MulDrop36.65092 03:05:04 13.04.2026 Show
Trojan.MulDrop36.65043 03:05:04 13.04.2026 Show
Trojan.MulDrop37.14 03:05:04 13.04.2026 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.