On execution, Singlejump.A replaces built in and third party applications with component that causes device to reboot when executed.
It also uses a Cabir variant that is modified so that instead of sending a copy of itself, the worm loads a specified SIS file (which is installed by Singlejump.A to a location where Cabir expects to find its own file) and starts sending it. In this case, the specified file is a copy of Trojan:SymbOS/Bootton.A.
The modified Cabir worm that Singlejump.A uses is based on Cabir.B and maintains the same replication flaw; thus, it is only capable of sending SymbOS/Bootton.A to the first phone it finds after reboot.
This trojan contains this message:
Saying HELLO From Here (SYRIA)
TO All The WORLD !!!
I Wish U N-Joy UR
Damaged Device ..
U Know, Not all may Read These Words But,
No Problem Bcuz Some will,
But even This, Thats The Way I Love U All ...