Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Worm:SymbOS/Commwarrior


Aliases:


SymbOS/Commwarrior

Malware
Worm
SymbOS

Summary

A standalone malicious program which uses computer or network resources to make complete copies of itself. May include code or other malware to damage both the system and the network.



Disinfection & Removal

F-Secure Mobile Anti-Virus detects Commwarrior and will delete the worm's components.

  • Download F-Secure Mobile Anti-Virus and activate it
  • Scan the phone and remove any components of the malware
  • Reboot the phone to remove memory resident components

After disinfection, you can remove any remaining empty directories by opening the phone's application manager and uninstalling the SIS file in which Commwarrior arrived. http://mobile.f-secure.com/disinfection/fcommwarrior.html



Technical Details

Variants in the Worm:SymbOS/Commwarrior family are worms that infect devices running the Symbian S60 2nd Edition operating system. Commwarrior can propagate by over both Bluetooth and Multimedia Message (MMS) networks.

For representative examples of variants in the Commwarrior family, please see the descriptions below:

Many of the variants in this family are closely related. For example, variant Commwarrior.E is closely related to Commwarrior.C


Propagation (Bluetooth)

When replicating over Bluetooth, the worm uses the device's native Bluetooth functionality to search for other Bluetooth-discoverable devices within the Bluetooth wireless range. The worm then attempts to send infected SIS files to the discovered devices.

The SIS files Commwarrior transmits are randomly named so that phone users cannot be warned to avoid files with any particular given name.


Propagation (MMS)

When replicating over MMS, Commwarrior sends out MMS messages containing the infected SIS file. On opening the MMS message, the recipient then becomes infected.

Depending on the variant, Commwarrior may send an infected MMS message to all users listed in an infected phone's contact book; to anyone who sends a message to the infected user; or to anyone the infected user contacts.







Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.

Keep your mobile device protected




F-Secure Mobile Security will keep your mobile device protected on the go and enable you to find it in case you lose it