Library
My library

+ Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
Android.DownLoader.5634 13:27:38 14.05.2025 Show
Android.BankBot.Ermac.65 06:46:12 13.05.2025 Show
Trojan.MulDrop32.943 03:03:40 14.05.2025 Show
Trojan.DownLoader48.39878 03:03:40 14.05.2025 Show
Trojan.Inject5.38914 03:03:40 14.05.2025 Show
Trojan.Siggen31.26597 03:03:40 14.05.2025 Show
Trojan.DownLoader48.39980 03:03:39 14.05.2025 Show
Trojan.Inject5.38885 03:03:39 14.05.2025 Show
Trojan.Siggen31.26802 03:03:39 14.05.2025 Show
Trojan.Siggen31.26748 03:03:39 14.05.2025 Show
Trojan.Inject5.38725 03:03:39 14.05.2025 Show
Trojan.Inject5.39334 03:03:39 14.05.2025 Show
Trojan.MulDrop32.995 03:03:39 14.05.2025 Show
Trojan.MulDrop32.1123 03:03:39 14.05.2025 Show
Trojan.MulDrop32.1297 03:03:39 14.05.2025 Show
Trojan.MulDrop32.967 03:03:39 14.05.2025 Show
Trojan.Siggen31.26690 03:03:39 14.05.2025 Show
Trojan.Siggen31.26583 03:03:39 14.05.2025 Show
Trojan.BankBot.901 03:03:39 14.05.2025 Show
Trojan.Inject5.38409 03:03:38 14.05.2025 Show
Trojan.DownLoader48.39762 03:03:38 14.05.2025 Show
Trojan.Inject5.39234 03:03:38 14.05.2025 Show
Trojan.Inject5.39333 03:03:38 14.05.2025 Show
Trojan.Siggen31.26841 03:03:38 14.05.2025 Show
Trojan.Siggen31.26756 03:03:38 14.05.2025 Show
Trojan.DownLoader48.39954 03:03:38 14.05.2025 Show
Trojan.Siggen31.26493 03:03:38 14.05.2025 Show
Trojan.DownLoader48.40013 03:03:38 14.05.2025 Show
Trojan.Siggen31.26626 03:03:38 14.05.2025 Show
Trojan.MulDrop32.1260 03:03:38 14.05.2025 Show
Trojan.MulDrop32.868 03:03:38 14.05.2025 Show
Trojan.MulDrop32.805 03:03:38 14.05.2025 Show
Trojan.Inject5.38881 03:03:38 14.05.2025 Show
Trojan.MulDrop32.1095 03:03:38 14.05.2025 Show
Trojan.MulDrop32.591 03:03:37 14.05.2025 Show
Trojan.MulDrop32.1032 03:03:37 14.05.2025 Show
Trojan.MulDrop32.1263 03:03:37 14.05.2025 Show
Trojan.Inject5.39328 03:03:37 14.05.2025 Show
Trojan.Inject5.39327 03:03:37 14.05.2025 Show
Trojan.Inject5.39330 03:03:37 14.05.2025 Show
Trojan.DownLoader48.39914 03:03:37 14.05.2025 Show
Trojan.Inject5.38782 03:03:37 14.05.2025 Show
Trojan.MulDrop32.1143 03:03:37 14.05.2025 Show
Trojan.MulDrop32.1248 03:03:37 14.05.2025 Show
Trojan.MulDrop32.1333 03:03:37 14.05.2025 Show
Trojan.MulDrop32.1391 03:03:36 14.05.2025 Show
Trojan.Inject5.39068 03:03:36 14.05.2025 Show
Trojan.Inject5.39180 03:03:36 14.05.2025 Show
Trojan.MulDrop32.1350 03:03:36 14.05.2025 Show
Trojan.DownLoader48.39861 03:03:36 14.05.2025 Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.