Threat Description



Aliases: Bootton.D, SymbOS/Cadomesk.A
Category: Malware
Type: Trojan
Platform: SymbOS


Bootton.D is a SIS file trojan that is quite similar to SymbOS/Bootton.A Symbian trojan.


Disinfection with two Series 60 phones

Please note that this disinfection method works only with phones on which the memory card can be changed without powering down the device.

Download F-Skulls tool from or directly with clean phone

1. Install F-Skulls.sis into infected phones memory card with a clean phone

2. Put the memory card with F-Skulls into infected phone

3. The F-Skulls starts automatically and frees the menu button and application manager

4. Press menu button until you get Symbian process menu, look for any applications with heart icon. Kill the application processes with 'C' button.5. Go to application manager and uninstall the SIS file in which you installed the Bootton.D

6. Download F-Secure Mobile Anti-Virus from and activate the Anti-Virus

7. Scan the phone and remove any remaining components of Bootton.D

8. Remove the F-Skulls with application manager as the phone is now cleaned

Technical Details

Bootton.D contains files from Skulls.A, Skulls.D and Bootton.A, Doomboot.A and drops Doomboot.A and Cabir.G on the device.

Like Bootton.A Bootton.D replaces system applications with application that causes system to reboot. And as the Bootton.D also contains corrupted binaries taken from Doomboot.A the device will not boot again.

If the menu application was running when Bootton.D was installed, pressing menu button will give normal application menu with most applications replaced with the application that reboots the device. If the menu application was not running, pressing menu button will reboot the device.

Bootton.D disables most of critical system functions and third party file managers, so that even if the device wouldn't immediately reboot it is still unusable before it is disinfected.

In addition of disabling applications on the phone, the Bootton.D also installs modified Cabir that SymbOS/Onehop.A uses to distribute Bootton.D. But this file does not get executed automatically, if user executes it manually it will try to send SymbOS/Doomboot.A to other devices over bluetooth.

Like Skulls.A the Bootton.D replaces the application icons with it's own icon, this time the icon is a heart icon with the text "I-Love-U"

If Bootton.D is installed only the calling from the phone and answering calls works until the device is rebooted. After reboot the only known method of recovering is to hard format the device.

Spreading in: Worms_Armageddon_by_DFT.sis


Bootton.D installs small component that resets the device if executed, this component is installed into locations where it replaces system and third party applications.

If the device is rebooted the Bootton.D prevents the device from starting up.


Generic detection that detects Bootton.D was published for F-Secure Mobile Anti-Virus on November 19th, 2004 in

Detection Type: Mobile
Database: database build number 11

Description Details: Jarno Niemela December 13th, 2005;
Description Last Modified: Jarno Niemela December 13th, 2005


Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Keep your mobile device protected

F-Secure Mobile Security will keep your mobile device protected on the go and enable you to find it in case you lose it

Learn More