Home > Threat descriptions >



Category: Malware

Type: -

Aliases: Bootton.D, SymbOS/Cadomesk.A


Bootton.D is renamed from it's old name SymbOS/Cadomesk.A, as it is close enough to Bootton family that Cadomesk family is no longer needed.


Disinfection with two Series 60 phones

Please note that this disinfection method works only with phones on which the memory card can be changed without powering down the device.

Download F-Skulls tool from ftp://ftp.f-secure.com/anti-virus/tools/f-skulls.zip or directly with clean phone https://www.europe.f-secure.com/tools/f-skulls.sis

  1. Install F-Skulls.sis into infected phones memory card with a clean phone
  2. Put the memory card with F-Skulls into infected phone
  3. The F-Skulls starts automatically and frees the menu button and application manager
  4. Press menu button until you get Symbian process menu, look for any applications with heart icon. Kill the application processes with 'C' button.
  5. Go to application manager and uninstall the SIS file in which you installed the Bootton.D
  6. Download F-Secure Mobile Anti-Virus from https://phoneav.com and activate the Anti-Virus
  7. Scan the phone and remove any remaining components of Bootton.D
  8. Remove the F-Skulls with application manager as the phone is now cleaned
Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Bootton.D is a SIS file trojan that is quite similar to SymbOS/Bootton.A Symbian trojan.

Bootton.D contains files from Skulls.A, Skulls.D and Bootton.A, Doomboot.A and drops Doomboot.A and Cabir.G on the device.

Like Bootton.A Bootton.D replaces system applications with application that causes system to reboot. And as the Bootton.D also contains corrupted binaries taken from Doomboot.A the device will not boot again.

If the menu application was running when Bootton.D was installed, pressing menu button will give normal application menu with most applications replaced with the application that reboots the device. If the menu application was not running, pressing menu button will reboot the device.

Bootton.D disables most of critical system functions and third party file managers, so that even if the device wouldn't immediately reboot it is still unusable before it is disinfected.

In addition of disabling applications on the phone, the Bootton.D also installs modified Cabir that SymbOS/Onehop.A uses to distribute Bootton.D. But this file does not get executed automatically, if user executes it manually it will try to send SymbOS/Doomboot.A to other devices over bluetooth.

Like Skulls.A the Bootton.D replaces the application icons with it's own icon, this time the icon is a heart icon with the text "I-Love-U"

If Bootton.D is installed only the calling from the phone and answering calls works until the device is rebooted. After reboot the only known method of recovering is to hard format the device.

Spreading in: Worms_Armageddon_by_DFT.sis


Bootton.D installs small component that resets the device if executed, this component is installed into locations where it replaces system and third party applications.

If the device is rebooted the Bootton.D prevents the device from starting up.