Trojan:SymbOS/Cardtrap.AF tries to disable system applications and third party products, and also installs additional malware onto the device.


F-Secure Mobile Anti-Virus is capable of detecting Cardtrap.AF with generic detection, so if the phone has functional Anti-Virus installed, Cardtrap.AF is blocked before it can be installed.

Disinfection with two Series 60 phones

Use the F-Skulls utility to allow for installation of F-Secure Mobile Anti-Virus. Download the F-Skulls tool from or directly to a clean phone from

  • Install F-Skulls.sis onto the infected phone's memory card with a clean phone
  • Put the memory card with the F-Skulls tool into the infected phone
  • Start up the infected phone and the application installer should now work
  • Go to the application manager and uninstall the SIS file in which you installed the malware
  • Download F-Secure Mobile Anti-Virus from and activate the Anti-Virus
  • Scan the phone and remove any remaining components of the malware
  • Remove the F-Skulls tool with the application manager as the phone should now be clean
Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Trojan:SymbOS/Cardtrap.AF affects devices running the Symbian S60 operating system. It is distributed in a malicious SIS file named 'BlueSoft Hacking Pro.sis' and when executed, tries to disable system applications and third party products. It also installs additional malware onto the device.


On execution, Cardtrap.AF tries to disable key system applications and third party products by installing several damaged files to the phone memory.

Cardtrap.AFalso installs files from the following Symbian-based malware:

  • Trojan:SymbOS/Blankfont.A
  • Trojan:SymbOS/Singlejump.A

It also installs following Windows malware:

  • W32/Generic.worm!p2p

to the phone's MultiMedia (MMC) card. The worm is installed with a filename, icon and shortcut link that tries to fool the user into clicking on them.

Date Created: -

Date Last Modified: -