Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Trojan:SymbOS/Singlejump.A


Aliases:


Trojan:SymbOS/Singlejump.A
SymbOS/Singlejump.A

Malware
Trojan
SymbOS

Summary

A trojan that secretly downloads malicious files from a remote server, then installs and executes the files.



Disinfection & Removal


Disinfection with two Series 60 phones

Download the F-Skulls tool either onto a computer or directly to the phone :

  • Install F-Skulls.sis into infected phones memory card with a clean phone
  • Put the memory card with F-Skulls into infected phone
  • Start up the infected phone, the application menu should work now
  • Press menu button until you get Symbian process menu, look for any applications with heart icon. Kill the application processes with 'C' button.
  • Go to application manager and uninstall the SIS file in which you installed the Singlejump.A
  • Download F-Secure Mobile Anti-Virus from http://phoneav.com and activate the Anti-Virus
  • Scan the phone and remove any remaining components of Singlejump.A
  • Remove the F-Skulls with application manager as the phone is now cleaned


Technical Details

Trojan:SymbOS/Singlejump.A affects devices running the Symbian S60 operating system. It is distributed in a malicious SIS file named 'PhotoID.v3.06_NEW_7610_3230_6630_SMPDA.sis'.

On execution, the trojan installs small component into locations where it replaces system and third party applications; if these applications are launched, the component resets the device.

Singlejump.A also installs a modified Bluetooth-Worm:SymbOS/Cabir variant that it uses to spread Trojan:SymbOS/Bootton.A to nearby Bluetooth-accessible devices; the modified Cabir is not started automatically but will start when device boots.


Execution

On execution, Singlejump.A replaces built in and third party applications with component that causes device to reboot when executed.

It also uses a Cabir variant that is modified so that instead of sending a copy of itself, the worm loads a specified SIS file (which is installed by Singlejump.A to a location where Cabir expects to find its own file) and starts sending it. In this case, the specified file is a copy of Trojan:SymbOS/Bootton.A.

The modified Cabir worm that Singlejump.A uses is based on Cabir.B and maintains the same replication flaw; thus, it is only capable of sending SymbOS/Bootton.A to the first phone it finds after reboot.

This trojan contains this message:

Saying HELLO From Here (SYRIA)

TO All The WORLD !!!

I Wish U N-Joy UR

Damaged Device ..

U Know, Not all may Read These Words But,

No Problem Bcuz Some will,

But even This, Thats The Way I Love U All ...

;-)

Regards,

ThNdRbRd







Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.

Keep your mobile device protected




F-Secure Mobile Security will keep your mobile device protected on the go and enable you to find it in case you lose it