Trojan:SymbOS/Bootton.D

Classification

Category :

Malware

Type :

-

Aliases :

Bootton.D, SymbOS/Cadomesk.A

Summary

Bootton.D is renamed from it's old name SymbOS/Cadomesk.A, as it is close enough to Bootton family that Cadomesk family is no longer needed.

Removal

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Bootton.D is a SIS file trojan that is quite similar to SymbOS/Bootton.A Symbian trojan.

Bootton.D contains files from Skulls.A, Skulls.D and Bootton.A, Doomboot.A and drops Doomboot.A and Cabir.G on the device.

Like Bootton.A Bootton.D replaces system applications with application that causes system to reboot. And as the Bootton.D also contains corrupted binaries taken from Doomboot.A the device will not boot again.

If the menu application was running when Bootton.D was installed, pressing menu button will give normal application menu with most applications replaced with the application that reboots the device. If the menu application was not running, pressing menu button will reboot the device.

Bootton.D disables most of critical system functions and third party file managers, so that even if the device wouldn't immediately reboot it is still unusable before it is disinfected.

In addition of disabling applications on the phone, the Bootton.D also installs modified Cabir that SymbOS/Onehop.A uses to distribute Bootton.D. But this file does not get executed automatically, if user executes it manually it will try to send SymbOS/Doomboot.A to other devices over bluetooth.

Like Skulls.A the Bootton.D replaces the application icons with it's own icon, this time the icon is a heart icon with the text "I-Love-U"

If Bootton.D is installed only the calling from the phone and answering calls works until the device is rebooted. After reboot the only known method of recovering is to hard format the device.

Spreading in: Worms_Armageddon_by_DFT.sis

Payload

Bootton.D installs small component that resets the device if executed, this component is installed into locations where it replaces system and third party applications.

If the device is rebooted the Bootton.D prevents the device from starting up.