Bootton.D is renamed from it's old name SymbOS/Cadomesk.A, as it is close enough to Bootton family that Cadomesk family is no longer needed.
Please note that this disinfection method works only with phones on which the memory card can be changed without powering down the device.
Download F-Skulls tool from ftp://ftp.f-secure.com/anti-virus/tools/f-skulls.zip or directly with clean phone https://www.europe.f-secure.com/tools/f-skulls.sis
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Bootton.D is a SIS file trojan that is quite similar to SymbOS/Bootton.A Symbian trojan.
Bootton.D contains files from Skulls.A, Skulls.D and Bootton.A, Doomboot.A and drops Doomboot.A and Cabir.G on the device.
Like Bootton.A Bootton.D replaces system applications with application that causes system to reboot. And as the Bootton.D also contains corrupted binaries taken from Doomboot.A the device will not boot again.
If the menu application was running when Bootton.D was installed, pressing menu button will give normal application menu with most applications replaced with the application that reboots the device. If the menu application was not running, pressing menu button will reboot the device.
Bootton.D disables most of critical system functions and third party file managers, so that even if the device wouldn't immediately reboot it is still unusable before it is disinfected.
In addition of disabling applications on the phone, the Bootton.D also installs modified Cabir that SymbOS/Onehop.A uses to distribute Bootton.D. But this file does not get executed automatically, if user executes it manually it will try to send SymbOS/Doomboot.A to other devices over bluetooth.
Like Skulls.A the Bootton.D replaces the application icons with it's own icon, this time the icon is a heart icon with the text "I-Love-U"
If Bootton.D is installed only the calling from the phone and answering calls works until the device is rebooted. After reboot the only known method of recovering is to hard format the device.
Spreading in: Worms_Armageddon_by_DFT.sis
Bootton.D installs small component that resets the device if executed, this component is installed into locations where it replaces system and third party applications.
If the device is rebooted the Bootton.D prevents the device from starting up.