Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Bootton.D


Aliases:


Bootton.D
SymbOS/Cadomesk.A

Malware

W32

Summary

Bootton.D is renamed from it's old name SymbOS/Cadomesk.A, as it is close enough to Bootton family that Cadomesk family is no longer needed.



Disinfection & Removal


Disinfection with two Series 60 phones

Please note that this disinfection method works only with phones on which the memory card can be changed without powering down the device.

Download F-Skulls tool from ftp://ftp.f-secure.com/anti-virus/tools/f-skulls.zip or directly with clean phone http://www.europe.f-secure.com/tools/f-skulls.sis

  • 1. Install F-Skulls.sis into infected phones memory card with a clean phone
  • 2. Put the memory card with F-Skulls into infected phone
  • 3. The F-Skulls starts automatically and frees the menu button and application manager
  • 4. Press menu button until you get Symbian process menu, look for any applications with heart
  • icon. Kill the application processes with 'C' button.
  • 5. Go to application manager and uninstall the SIS file in which you installed the Bootton.D
  • 6. Download F-Secure Mobile Anti-Virus from http://phoneav.com and activate the Anti-Virus
  • 7. Scan the phone and remove any remaining components of Bootton.D
  • 8. Remove the F-Skulls with application manager as the phone is now cleaned


Technical Details

Bootton.D is a SIS file trojan that is quite similar to SymbOS/Bootton.A Symbian trojan.

Bootton.D contains files from Skulls.A, Skulls.D and Bootton.A, Doomboot.A and drops Doomboot.A and Cabir.G on the device.

Like Bootton.A Bootton.D replaces system applications with application that causes system to reboot. And as the Bootton.D also contains corrupted binaries taken from Doomboot.A the device will not boot again.

If the menu application was running when Bootton.D was installed, pressing menu button will give normal application menu with most applications replaced with the application that reboots the device. If the menu application was not running, pressing menu button will reboot the device.

Bootton.D disables most of critical system functions and third party file managers, so that even if the device wouldn't immediately reboot it is still unusable before it is disinfected.

In addition of disabling applications on the phone, the Bootton.D also installs modified Cabir that SymbOS/Onehop.A uses to distribute Bootton.D. But this file does not get executed automatically, if user executes it manually it will try to send SymbOS/Doomboot.A to other devices over bluetooth.

Like Skulls.A the Bootton.D replaces the application icons with it's own icon, this time the icon is a heart icon with the text "I-Love-U"

If Bootton.D is installed only the calling from the phone and answering calls works until the device is rebooted. After reboot the only known method of recovering is to hard format the device.

Spreading in: Worms_Armageddon_by_DFT.sis


Payload

Bootton.D installs small component that resets the device if executed, this component is installed into locations where it replaces system and third party applications.

If the device is rebooted the Bootton.D prevents the device from starting up.



Detection

Generic detection that detects Bootton.D was published for F-Secure Mobile Anti-Virus on November 19th, 2004 in

Detection Type: Mobile
Database: database build number 11



Description Created: Jarno Niemela August 31st, 2005;
Description Last Modified: Jarno Niemela December 13th, 2005



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.