Tuesday, July 28, 2009

List of Symbian OS mobile viruses

List Of Mobile Virus

Source Codes:

BlueJackX Source Code
Caribe.A.source code.zip
Caribe.AA-Spooky.zip
Caribe.AC-Spooky.zip
CommWarrior C Source Code
MOSQIT-A.IDE
velasco cellphone virus source code.zip
velasco cellphone worm source code.zip

Symbian Viruses:
3gexplorer.sis
Appdisabler.A!-BT TeRoR v0.10.sis
Appdisabler.B!-Raghu.sis
Appdisabler.D!-Raghu.sis
Appdisabler.Gen!-Bluetooth Speed v2.0 - BiNPDA.sis
Appdisabler.Gen!-BLUETOOTH.SPEED.sis
Appdisabler.Gen!-Browser_NGAGEQD.sis
Appdisabler.Gen!-FreeCrypt.sis
Appdisabler.Gen!-Lucifa.sis
Appdisabler.Gen!-Mobi Cleaner 2008.sis
Appdisabler.Gen!-Modified Virus.sis
Appdisabler.Gen!-New! !_Startup windowXP NOKIA.sis
Appdisabler.Gen!-Nokia Sensor.sis
Appdisabler.Gen!-Rebooter.sis
Appdisabler.H!-Raghu.sis
Appdisabler.S!-MyDoom.sis
Beselo.A!-Beauty.jpg
Beselo.A!-Love.rm
BlankFont.A!-Rally 2.sis
BlankFont.B!-Rally 3.sis
BlankFont.C!-Rally 3.sis
BlueJackX.sis
Bluetooth_terror v1.50.sis
Bootton.A!-ILoveU.sis
Bootton.D!-Worms Armageddon by DFT.sis
Bootton.F!-Rebooter by WarriorMarrior.sis
Bootton.G!-PHalls_v1.00.sis
BTex.sis
Cabir.A!-Caribe.sis
Cabir.AA!-INBOX.sis
Cabir.AC!-INBOX.sis
Cabir.AF!-Pinball.sis
Cabir.B!-Caribe.sis
Cabir.B,1!-3d_OIDI500.sis
Cabir.C!-Ni&Ai-.sis
Cabir.D!-Mytiti.sis
Cabir.E!-[YUAN].sis
Cabir.F!-Skulls.sis
Cabir.G!-Tee222.sis
Cabir.I!-BtChatX 2007.sis
Cabir.I!-H5N1.sis
Cabir.I!-Velasco.sis
Cabir.I!-West-Nil.sis
Cabir.J!-IHateU.sis
Cabir.K!-Marcos (Worm).sis
Cabir.K!-Velasco (Worm).sis
Cabir.M!-Free$8.sis
Cabir.N!-SEXY-.sis
Cabir.O!-Mobile.sis
Cabir.P!-22207-.sis
Cabir.Q!-Crazy!.sis
Cabir.R!-Fuyuan.sis
Cabir.R!-Nawras.sis
Cabir.S!-Guan4u.sis
Cabir.T!-ILoveU.sis
Cabir.U_Sexxxy.sis
Cabir.V!-Mariya.sis
Cabir.X!-symTEE.sis
Cabir.Y!-SmartMovie2.52full.sis
Cabir.Y!-yuanV2.sis
Cadomesk.A!-F-Cabir.sis
Cadomesk.B!-Brgbg.sis
Cadomesk.C!-CabirFix.sis
Cardblock.A!-InstantSis.sis
Cardtrp.A!-Black_Symbian v0.10.sis
Cardtrp.A!-FATIconz.sis
Cardtrp.AB!-Anti Virus from F-Secure.sis
Cardtrp.AD!-Opera PATCH FULL ++.sis
Cardtrp.AF!-BlueSoft Hacking Pro.sis
Cardtrp.B!-CamcorderPro v3.00 final.sis
Cardtrp.P!-Half Life 2 - Gameloft .sis
Cardtrp.Q!-KingKong Game - CRACKED .sis
Cardtrp.R!-RealPlayer v01.00.sis
Cardtrp.T!-BattleField 2 - GAMELOFT.sis
Cardtrp.X!-Image Manager - BiNPDa.sis
Cdropper.B!-Sexxxy Pictures of Me.sis
Cdropper.H!-CAMTIMER.sis
Cdropper.M!-Caribe.sis
Cdropper.N!-EzBoot.sis
Cdropper.O!-Pinball S60.sis
Commdropper.A!-Update TomTom Mobile 5.40.sis
Commdropper.D!-GprsSettings.sis
Commdropper.E!-Mp3 UltraDJ.sis
Commdropper.G!-Norton_Symbian Full.sis
Commdropper.H!-Mobiluck 5.73 Cracked.sis
Commwarrior.A!-Naruto_shipudden_By_team_BeNPDA.sis
Commwarrior.A!.sis
Commwarrior.B!-Casper.sis
Commwarrior.B!.sis
Commwarrior.C!-CoMmWArrIoR.sis
Commwarrior.C!-CWOutcast.sis
Commwarrior.C!.zip
Commwarrior.D!-HackTool!!!.sis
Commwarrior.E!-Amena_Info.sis
Commwarrior.G!-Chatt Yahoo.sis
Commwarrior.H!-Mp3 UltraDJ.sis
Commwarrior.I!-LeslieLoves.jpg
Commwarrior.I!-Sudoku Play.sis
Commwarrior.J!-F-Explorer 1.6.sis
Commwarrior.M!-NortonPro..sis
Commwarrior.Q!-Coolantivirus.sis
Commwarrior.Q!-FExplorer.v1.17.Cracked.sis
Commwarrior.Q!-Final Team v 2.11.sis
Commwarrior.Q!-Smart hardware calculator.sis
Commwarrior.Q!-Static Sex Game v3.99.sis
Commwarrior.Q!.zip
Cw.sis
Dampig.A!-FScaller3.2Crack7610.sis
Dampig.A,1!-FaceWave5.20-7610-6600.sis
Disable images load in standard browse s60v2.sis
Doomboot.A!-Doom 2 cracked DFT v1.0.sis
Doomboot.B!-Restart.sis
Appdisabler.Gen!-Modified Virus.sis
Doomboot.G!-exoVirusStop v2.13.16.sis
Doomboot.I!-exoVirusStop v2.13.19.sis
Doomboot.J!-AppManager 1.0.sis
Doomboot.M!-Leslie Loves.sis
Drever.A!-lmpro.sis
Drever.B!-Anitivirus 1.17.sis
Drever.B!-Anti-Virus 1.02.sis
Drever.B!-Anti-Virus 1.22.sis
Drever.B!-AntiVirus 1.1.8 DotSIS.sis
Drever.B!-SimworkAnitivirus 1.15.sis
Drever.B!.mdl
Drever.C!-New_bases_and_crack_for_antiviruses.sis
Drever.D!-Drever.sis
Fontal.A!-Font_remover.sis
Fontal.A!-Fontremover.sis
Fontal.A!-Kill Saddam By OID500.sis
Fontal.H!-T-VIRUS.sis
Fontal.I!-Nokia Anti-Virus.sis
Fontal.I!-San_fonts.sis
For Nokia 6600.sis
Formatting-phone-s60.sis
Guardian
Guardian v.200.sis
Harrisii.sis
Hidmenu.A!-Apple_icons s60.sis
Hidmenu.A!-Freak SysIcons.sis
Hidmenu.A!-Hide_menu 1.0.sis
Hidmenu.A!-XP_Candy_[kev_kev].sis
Hidmenu.A!-XpTheme.sis
Hidmenu.A,1!-Szilvia's Dream 1.4.sis
Hobbes.A!-Symantec Anti-Virus.sis
Jimm.jar
Killphone.B!-Nice Phone Starter v0.1 Beta.sis
Killphone.B!-Phone-Startup-Like-Pc.sis_unpack.sis
Killphone.B!-Phone-Startup-Like-Pcvirus.sis_unpack.sis
iSexPlayer.jar
Lasco.A!-Marcos (Virus).sis
Lasco.A!-Velasco (Virus).sis
Lasco.A!-Velasco.sis
LCG Jukebox (Sms Lite).sis
LCRemover!-Unlock Security.sis
Locknut.B!-mmfaddon.sis
Locknut.C!-Patch.sis
Locknut.D!-Patch.sis
Mabir.A!-Caribe.sis
Mabir.A!-Info.sis
Mabir.C!-Gollum ScreenSaver.sis
Mabtal.A!-[Profimail v2.75_FULL].sis
MagicBlueHack.jar
MediaPlay
Mp3 Editor
Mobile Security.sis
Mrex.A!-MreX Beta.sis
Need For Speed UnderGround 3D.sis
Need_For_Speed_Underground2_ By_V-Cast_Repacked_For_Nokia_Symbian(only 6630,6680,6600,n-gage,n-gageQD).sis
NeedforSpeed.sis
New Font.sis
Opera_Booster.sis
OPLProcedureUtilities.sis
Ozicom 7650 Hebrew v1.03.sis
Ozicom Nokia 7650 Hebrew Support.sis
Pbstealer.C!-PBCompressor.sis
Pbstealer.D!-PBCompressor.sis
Pbstealer.E!-MyProfile.sis
Pe_Dropper.Gen!-PrinceOfPersia 3D.sis
Phayam.A!-AutoExec.sis
Phayam.A,1!-BlackList.sis
Phayam.A,2!-PhotoRite SP.sis
Phayam.A,3!-PowerLock.sis
Phayam.B!-explore.v1.22.s60.sis
Redbrowser.A!-RedBrowser.jar
Redbrowser.B!-CheapSMS.V2.1.jar
RommWar.A!-Stoper by WarriorMarrior.sis
RommWar.B!-FuckyouMarrior.sis
RommWar.D!-KAV Mobile V 1_8.sis
Romride.D!-Anti-Virus.sis
Sendtool.A!-FSpreader.sis
Silenthill3D.v1.2.sis
Singlejump.A!-F-Secure_Antivirus.sis
Singlejump.B!-MetalG.sis
Singlejump.C!-MetalG.sis
Singlejump.D!-SplinterCell-ChaosTheory_ngage_cracked-XiMPDA.sis
Singlejump.E!-SplinterCell-ChaosTheory_ngage_cracked-XiMPDA.sis
Singlejump.G!-Carmageddon 3D.sis
SIS_Recursion.Gen!-apple_8LKDyYF8.sis
SIS_Recursion.Gen!-Doraemon23_dHUEBtml.sis
SIS_Recursion.Gen!-www,OwnSkin,com Theme.sis
Skudoo!-BounceMP3.sis
Skuller.Gen!-Menu Speeder.sis
Skuller.Gen!-Opera8.65_2009mod.sis_unpack.sis
Skulls!-FuckBT.sis
Skulls.019!-PHalls_Beta.sis
Skulls.025!-BlueNumStealer!.sis
Skulls.A!-Extended Theme.sis
Skulls.AB!-TyTrone Programs v2.2.0 by sharp_the_legend.sis
Skulls.AD!-FreeCall_1.01-XiMpda.sis
Skulls.B!-Icons.sis
Skulls.B!-PaletteExtender.sis
Skulls.BX!-F-Secure_S60-Anti-Virus.sis
Skulls.BZ!-X-Ray Full byDotSis.sis
Skulls.C!-MyDoom.sis
Skulls.C!-PILEK.sis
Skulls.C!-T2 RS3AS.sis
Skulls.CB!-Mobiluck.sis
Skulls.CG!-SkullsRevised.sis
Skulls.CI!-Phalls v0.5.sis
Skulls.D!-beta_092_free-sms-RM8.sis
Skulls.D!-Macromedia_Flash_1.1_Full_3650_Ngage_Dotsis.sis
Skulls.D!-Yew Sprite 1.0 Dotsis.sis
Skulls.E!-Mariya.sis
Skulls.F!-ThNdRbRd.sis
Skulls.G!-Simworks.sis
Skulls.Gen!-Fixx_SymbianWare.sis
Skulls.H!-SysIconz v1.01.sis
Skulls.N!-Naruto_Screesaver.sis
Skulls.N!-Recap.sis
Skulls.N!-respineda_virus_2008.sis
Skulls.N!-shinchan scrensaver.sis
Skulls.sis
SMS.J2ME.Swapi.Q!-Artillery.jar
Sms.Python.Flocker.A!-Mp3TegEditor.sis
SmsAnywhereLite.A!-Sms Lite 1.10.sis
SpeakDoom!-F-Secure 2.30 cracked symcracKV.sis
Speedup.sis
Spyware.FlexiSpy!-Phones.sis
Stealwar.C!-StealWarrior.sis
System_Files.Gen!-About-1.04 -mEnPDA-.sis
System_Files.Gen!-doomboot2.sis
System_Files.Gen!-FB_Enhancer.sis
System_Files.Gen!-Notepad - BiNPDA.sis
Trojan.Mos!-Mosquitos by Soddom.sis
TSG Phone Safe.sis
VirusScanMobile.sis
VMS_1.0_rus.sis
Warelex.Mobiola.WebCam.USB.v1.00.S60.SymbianOS.Cra cked-BiNPDA.sis
Warelex.Mobiola.WebCam.v1.04.S60.SymbianOS.Cracked-BiNPDA.sis

Repacked Viruses:
Byakugan screensaver.sis
Cheat of all game.sis
DooMsDAY-BeNPDA.sis
FightNightRound3 v1.02 3D.sis
Free gprs.sis
IRremote v2.03 os8.os8.1.sis
karaoke.play-7610.6630.6680.N70.sis
kilabot virus.sis
krian_C.sis-my own made virus
krian_D.sis-my own made virus
LockNLoad3 evolution v1.02.sis
Mp3_DJ-mixer-S60by_Great_ReHMAN+919831195560.sis
Mp3_mixer1.6s60x.sis
N-Gage-game_Driver_for_S60_Great_ReHMAN+919831195560.sis
Nightmare keygen.sis
Nightmare3D v1.02 cracked.sis
Pamela Anderson Naked Theme.sis-my own made virus
Pasaload Stealer.sis_S60v1&2.sis
photobase.v2.0.Crack-BeNPDA.sis
Symantec Antivirus 2008 from Nokia.sis
Wademon Virus-v1.sis
Wapdemon Virus-v2.sis
WYVERN ziruz.sis

MacOSX:
macOSX - virus.sit

Virus Tools:
Biennale.py
Create Commwarrior.zip
datamessage.rar
Easy Symbian Virus Creator.zip
errormail.zip
Mobler Source Code (VB6 App).zip
SMSDOS.ZIP
Symbian Killer.zip
SMS Virus.txt
virus for mobile.rar
virus mobile.zip
Virus_alert.exe

Symbian OS Mobile Virus

Worm.SymbOS.Cabir.a
Cabir is the first network worm capable of spreading via Bluetooth; it infects mobile phones which run Symbian OS.
A wide range of phones from a numb
er of manufacturers use this technology

.
It is clear that Nokia 3650, 7650 and N-Gage phones can all be infected by Cabir.
However, any handset running Symbian OS is potentially vulnerable to infection.

Where ?

?:\system\apps\caribe\caribe.app
?:\system\apps\caribe\flo.mdl
?:\system\apps\caribe\caribe.rsc

C:\SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\ CARIBE.SIS
C:\SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\ CARIBE.APP
C:\SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\ CARIBE.RSC
C:\SYSTEM\RECOGS\FLO.MDL


They are identical, except that one version, when displaying a Window Alert text, will include the text line VZ/29a.

The worm itself is an SIS format file, called caribe.sis, of 15092 bytes in size (the second version is 15104 bytes in size)

File berisi :
+ caribe.app: 11932 bytes/ 11944 bytes in size
+ flo.mdl: 2544 bytes in size
+ caribe.rsc: 44 bytes in size
also you can remove with this decabir.
Attached Files
File Type: sis decabir.sis (7.7 KB, 319 views)
Worm.SymbOS.Cabir.b

This malicious program is a womr which runs under Symbian.
The worm itself is a SIS file.
The file is 10,000 bytes in size.
The file spreads via Bluetooth.

Dimana?


C:\system\apps\OIDI500\OIDI500.aif — is an executable EPOC file, and is 11932 bytes in size. This is the main worm file.
C:\system\apps\OIDI500\OIDI500.app — is a file containing program resources.
C:\system\apps\OIDI500\OIDI500.mdl — ensures that the malicous program will be automatically started if the device is rebooted.
C:\system\apps\OIDI500\OIDI500.rsc — is the application
icon file.




Ketika sudah terinstal >>

Once the device has been infected, a file called C\:SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMA\CARIB E.SIS.It is this file which will be transmitted in order to infect other devices.
The worm then scans for accessible devices which have Bluetooth enabled.
The worm will choose the first accessible device in the list and attempt to send caribe.sis to this device.
The worm has no malicious payload apart from its propagation routine.
However, the worm's presence in memory and its attempts to scan for accessible Bluetooth devices may cause an infected device to become unstable.

Removal Instruction at


C:\system\apps\OIDI500\OIDI500.aif
C:\system\apps\OIDI500\OIDI500.app
C:\system\apps\OIDI500\OIDI500.mdl
C:\system\apps\OIDI500\OIDI500.rsc
C:\SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMA\CARIB E.SIS
Worm.SymbOS.Cabir.d

This malicious program is a worm which runs under Symbian.
The worm itself is a SIS file.
The file is 13,200 bytes in size.
It spreads via Bluetooth.

Where ?
C:\SYSTEM\apps\MYTITI\MYTITI.app is an executable EPOC file, and is 11,932 bytes in size. This is the main worm file;
C:\SYSTEM\apps\MYTITI\MYTITI.rsc is the worm's resource file;
C:\SYSTEM\apps\MYTITI\flo.mdl ensures that the malicous program will be automatically started if the device is rebooted.



When installed >>

Once the device has been infected, a file called C\:SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMA\CARIB E.SIS is created.
It is this file which will be transmitted in order to infect other devices.
The worm then scans for accessible devices which have Bluetooth enabled.
The worm will choose the first accessible device in the list and attempt to send caribe.sis to this device.
The worm has no malicious payload apart from its propagation routine.
However, the worm's presence in memory and its attempts to scan for accessible Bluetooth devices may cause an infected device to become unstable. *poDo wAe*

Removal Instruction at
C:\SYSTEM\apps\MYTITI\flo.mdl
C:\SYSTEM\apps\MYTITI\MYTITI.app
C:\SYSTEM\apps\MYTITI\MYTITI.rsc
C:\SYSTEM\SYMBIANSECUREDATA\MYTITISECURITYMANAGER\ MYTITI.SIS
Worm.SymbOS.Cabir.k

This worm is programmed for mobile phones running Symbian OS.
The worm itself is an SIS file named caribe.sis.
The file is 17596 bytes in size.
The file contains three other files:

- caribe.app: approximately 14440 bytes in size
- flo.mdl: approximately 2540 bytes in size
- caribe.rsc: 44 bytes in size


Where?

c:\System\apps\caribe\caribe.app
c:\system\apps\caribe\flo.mdl
c:\system\apps\caribe\caribe.rsc

C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.SIS
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.APP
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.RSC
C:SYSTEMRECOGSFLO.MDL

C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.SIS
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERINFO .SIS


When Installed >>

Akan muncul pesan di tampilan depan hape
Code:
"Caribe Version 2 - ValleZ/29a"


Each time the user switches on the infected telephone, the worm will scan the list of active BlueTooth connections.
IT will then select the first connection listed as accessible, and will attempt to send the main file to the device.
The recipient will see the following message:
Code:
Install Caribe?

f the recipient answers yes, then the infected file will be accepted, and the user will be asked if they wish to launch the file.
This depends on the model of the telephone - please see the description of Worm.SymbOS.Cabir.a for further details)
n addition to this, the worm, unlike previous versions of Cabir, is able to self replicate via MMS.
It will automatically answer any incoming SMS or MMS with an MMS which includes an attached copy of the infected file.

Removal Instruction at

c:systemappscaribecaribe.app
c:systemappscaribeflo.mdl
c:systemappscaribecaribe.rsc

C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.SIS
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.APP
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.RSC
C:SYSTEMRECOGSFLO.MDL
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.SIS
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERINFO .SIS
Virus.WinCE.Duts.a

WinCE.Duts.a is the first virus for devices running under Windows CE .NET.
It can infect devices running the following operating systems: PocketPC 2000, PocketPC 2002, PocketPC 2003.
The virus itself is an ARM processor program and is 1520 bytes in size.
When run, the program displays the following message:




When Installed >>

If confirmation is given, the virus will infect executable files which correspond to the following criteria: ARM processor, more than 4KB in size, located in the device's root directory (My device).
The virus writes itself to the last section of these files and establishes an entry point at the beginning of the file.
Infected files will contain the signature 'atar' in an unused PE header.
Worm.SymbOS.Lasco.a

Worm.SymbOS.Lasco.a is a worm capable of infecting PDAs and mobile phones running under Symbian OS.
Lasco spreads to executable files [SIS archives] on the infected device, making it the first virus for this platform.
Lasco.a was written by the author of the most recent versions of Worm.SymbOS.Cabir and based on Cabir's source code.
Lasco.a replicates via BlueTooth in the same way as Cabir does.
In addition to replicating via BlueTooth, Lasco.a also infects files.
When executing, it scans the disk for SIS archives, and attempts to infect these files found by inserting its code.
Lasco.a has been developed in two ways: one is an application for the Win32 platform, which infects SIS files, and the other is for the Symbian platform.

* velasco.sis is 15750 bytes in size, and contains the code of the virus itself
* sisinfect.exe is 69632 bytes in size, and is an infector developed for Windows. This file will scan local disks for SIS files and infect them by inserting the contents of velasco.sis.
* marcos.sis is 1579 bytes in size and contains a module, marco.mdl, which installs velasco.sis into the Symbian autostart system.

Removal Instruction at

C:\SYSTEM\SYMBIANSECUREDATA\VELASCO\*
C:\SYSTEM\RECOGS\MARCOS.MDL
Trojan.SymbOS.Skuller.a

This Trojan program infects mobile phones running Symbian.
Any mobile running Symbian is potentially vulnerable.
The Trojan itself is an SIS file, usually called 'extendedtheme.sis', although it may have a different name.
The file is 1,192,117 bytes in size.
The Trojan was distributed via a range of mobile phone forums.
It was presented as a program with new icons, new wallpaper etc.

Setelah terInstall, Trojan membuat file dan aplikasi2 baru :

Code:

* .\System\Apps\About\About.aif
* .\System\Apps\About\About.app

* .\System\Apps\AppInst\AppInst.aif
* .\System\Apps\AppInst\Appinst.app

* .\System\Apps\AppMngr\AppMngr.aif
* .\System\Apps\AppMngr\Appmngr.app

* .\System\Apps\Autolock\Autolock.aif
* .\System\Apps\Autolock\Autolock.app

* .\System\Apps\Browser\Browser.aif
* .\System\Apps\Browser\Browser.app

* .\System\Apps\BtUi\BtUi.aif
* .\System\Apps\BtUi\BtUi.app

* .\System\Apps\bva\bva.aif
* .\System\Apps\bva\bva.app

* .\System\Apps\Calcsoft\Calcsoft.aif
* .\System\Apps\Calcsoft\Calcsoft.app

* .\System\Apps\Calendar\Calendar.aif
* .\System\Apps\Calendar\Calendar.app

* .\System\Apps\Camcorder\Camcorder.aif
* .\System\Apps\Camcorder\Camcorder.app

* .\System\Apps\CbsUiApp\CbsUiApp.aif
* .\System\Apps\CbsUiApp\CbsUiApp.app

* .\System\Apps\CERTSAVER\CERTSAVER.aif
* .\System\Apps\CERTSAVER\CERTSAVER.APP

* .\System\Apps\Chat\Chat.aif
* .\System\Apps\Chat\Chat.app

* .\System\Apps\ClockApp\ClockApp.aif
* .\System\Apps\ClockApp\ClockApp.app

* .\System\Apps\CodViewer\CodViewer.aif
* .\System\Apps\CodViewer\CodViewer.app

* .\System\Apps\ConnectionMonitorUi\ConnectionMonito rUi.aif
* .\System\Apps\ConnectionMonitorUi\ConnectionMonito rUi.app

* .\System\Apps\Converter\Converter.aif
* .\System\Apps\Converter\converter.app

* .\System\Apps\cshelp\cshelp.aif
* .\System\Apps\cshelp\cshelp.app

* .\System\Apps\DdViewer\DdViewer.aif
* .\System\Apps\DdViewer\DdViewer.app

* .\System\Apps\Dictionary\Dictionary.aif
* .\System\Apps\Dictionary\dictionary.app

* .\System\Apps\FileManager\FileManager.aif
* .\System\Apps\FileManager\FileManager.app

* .\System\Apps\GS\GS.aif
* .\System\Apps\GS\gs.app

* .\System\Apps\ImageViewer\ImageViewer.aif
* .\System\Apps\ImageViewer\ImageViewer.app

* .\System\Apps\location\location.aif
* .\System\Apps\location\location.app

* .\System\Apps\Logs\Logs.aif
* .\System\Apps\Logs\Logs.app

* .\System\Apps\mce\mce.aif
* .\System\Apps\mce\mce.app

* .\System\Apps\MediaGallery\MediaGallery.aif
* .\System\Apps\MediaGallery\MediaGallery.app

* .\System\Apps\MediaPlayer\MediaPlayer.aif
* .\System\Apps\MediaPlayer\MediaPlayer.app

* .\System\Apps\MediaSettings\MediaSettings.aif
* .\System\Apps\MediaSettings\MediaSettings.app

* .\System\Apps\Menu\Menu.aif
* .\System\Apps\Menu\Menu.app

* .\System\Apps\mmcapp\mmcapp.aif
* .\System\Apps\mmcapp\mmcapp.app

* .\System\Apps\MMM\MMM.app

* .\System\Apps\MmsEditor\MmsEditor.aif
* .\System\Apps\MmsEditor\MmsEditor.app

* .\System\Apps\MmsViewer\MmsViewer.aif
* .\System\Apps\MmsViewer\MmsViewer.app

* .\System\Apps\MsgMailEditor\MsgMailEditor.aif
* .\System\Apps\MsgMailEditor\MsgMailEditor.app

* .\System\Apps\MsgMailViewer\MsgMailViewer.aif
* .\System\Apps\MsgMailViewer\MsgMailViewer.app

* .\System\Apps\MusicPlayer\MusicPlayer.aif
* .\System\Apps\MusicPlayer\MusicPlayer.app

* .\System\Apps\Notepad\Notepad.aif
* .\System\Apps\Notepad\Notepad.app

* .\System\Apps\NpdViewer\NpdViewer.aif
* .\System\Apps\NpdViewer\NpdViewer.app

* .\System\Apps\NSmlDMSync\NSmlDMSync.aif
* .\System\Apps\NSmlDMSync\NSmlDMSync.app

* .\System\Apps\NSmlDSSync\NSmlDSSync.aif
* .\System\Apps\NSmlDSSync\NSmlDSSync.app

* .\System\Apps\Phone\Phone.aif
* .\System\Apps\Phone\Phone.app

* .\System\Apps\Phonebook\Phonebook.aif
* .\System\Apps\Phonebook\Phonebook.app

* .\System\Apps\Pinboard\Pinboard.aif
* .\System\Apps\Pinboard\Pinboard.app

* .\System\Apps\PRESENCE\PRESENCE.aif
* .\System\Apps\PRESENCE\PRESENCE.APP

* .\System\Apps\ProfileApp\ProfileApp.aif
* .\System\Apps\ProfileApp\profileapp.app

* .\System\Apps\ProvisioningCx\ProvisioningCx.aif
* .\System\Apps\ProvisioningCx\ProvisioningCx.app

* .\System\Apps\PSLN\PSLN.aif
* .\System\Apps\PSLN\PSLN.app

* .\System\Apps\PushViewer\PushViewer.aif
* .\System\Apps\PushViewer\PushViewer.app

* .\System\Apps\Satui\Satui.aif
* .\System\Apps\Satui\Satui.app

* .\System\Apps\SchemeApp\SchemeApp.aif
* .\System\Apps\SchemeApp\SchemeApp.app

* .\System\Apps\ScreenSaver\ScreenSaver.aif
* .\System\Apps\ScreenSaver\ScreenSaver.app

* .\System\Apps\Sdn\Sdn.aif
* .\System\Apps\Sdn\Sdn.app

* .\System\Apps\SimDirectory\SimDirectory.aif
* .\System\Apps\SimDirectory\SimDirectory.app

* .\System\Apps\SmsEditor\SmsEditor.aif
* .\System\Apps\SmsEditor\SmsEditor.app

* .\System\Apps\SmsViewer\SmsViewer.aif
* .\System\Apps\SmsViewer\SmsViewer.app

* .\System\Apps\Speeddial\Speeddial.aif
* .\System\Apps\Speeddial\Speeddial.app

* .\System\Apps\Startup\Startup.aif
* .\System\Apps\Startup\Startup.app

* .\System\Apps\SysAp\SysAp.aif
* .\System\Apps\SysAp\SysAp.app

* .\System\Apps\ToDo\ToDo.aif
* .\System\Apps\ToDo\ToDo.app

* .\System\Apps\Ussd\Ussd.aif
* .\System\Apps\Ussd\Ussd.app

* .\System\Apps\VCommand\VCommand.aif
* .\System\Apps\VCommand\VCommand.app

* .\System\Apps\Vm\Vm.aif
* .\System\Apps\Vm\Vm.app

* .\System\Apps\Voicerecorder\Voicerecorder.aif
* .\System\Apps\Voicerecorder\Voicerecorder.app

* .\System\Apps\WALLETAVMGMT\WALLETAVMGMT.aif
* .\System\Apps\WALLETAVMGMT\WALLETAVMGMT.APP

* .\System\Apps\WALLETAVOTA\WALLETAVOTA.aif
* .\System\Apps\WALLETAVOTA\WALLETAVOTA.APP



and then at Libs folder

Code:

* .\System\Libs\licencemanager20s.dll
* .\System\Libs\lmpro.r01
* .\System\Libs\lmpro.r02
* .\System\Libs\notification.cmd
* .\System\Libs\softwarecopier200.dll
* .\System\Libs\ZLIB.DLL



Trojan.SymbOS.Locknut.a

This Trojan is an application for Symbian, and is an SIS archive 1 - 2 KB in size.

Where ?

?\system\apps\gavno\gavno.app
?\system\apps\gavno\gavno.rsc
?\system\apps\gavno\gavno_caption.rsc

All these files contain text in Russian, and do not contain service information appropriate to the format.
If an attempt is made to launch the .app file, which is not in fact executable, an operating system error will occur.
This means that the infected mobile device may lose part of its functionality.

Removal Instruction at


?\system\apps\gavno\gavno.app
?\system\apps\gavno\gavno.rsc
?\system\apps\gavno\gavno_caption.rsc
?\system\installed\gavno.sis


Worm.SymbOS.Comwar.a

This is the first worm for mobiles phones which is able to propagate via MMS.
It infects telephones running under OS Symbian Series 60.
The executable worm file is packed into a Symbian archive (*.SIS).
The archive is approximately 27 - 30KB in size.
The name of the file varies: when propagating via Bluetooth, the worm creates a random file name, which will be 8 characters long.
ex : bg82o_s1.sis

Where ?

?\system\apps\CommWarrior\commwarrior.exe
?\system\apps\CommWarrior\commrec.mdl
?\system\updates\commwarrior.exe
?\system\updates\commrec.mdl
?\system\updates\commw.sis


The worm propagates via Bluetooth and MMS.
Once launched, the worm will search for accessible Bluetooth devices and send the infected .SIS archive
under a random name to these devices. In order to open the attachment (which will consequently infect the telephone)
the user will have to confirm several times that he wishes to receive the file.

kLo MMS uda terkirim, akan muncul pesan berikut kpd si penerima :
Code:

* Norton AntiVirus Released now for mobile, install it!
* 3DGame 3DGame from me. It is FREE !
* 3DNow! 3DNow!(tm) mobile emulator for *GAMES*.
* Audio driver Live3D driver with polyphonic virtual speakers!
* CheckDisk *FREE* CheckDisk for SymbianOS released!MobiComm
* Desktop manager Official Symbian desctop manager.
* Display driver Real True Color mobile display driver!
* Dr.Web New Dr.Web antivirus for Symbian OS. Try it!
* Free SEX! Free *SEX* software for you!
* Happy Birthday! Happy Birthday! It is present for you!
* Internet Accelerator Internet accelerator, SSL security update #7.
* Internet Cracker It is *EASY* to *CRACK* provider accounts!
* MS-DOS MS-DOS emulator for SymbvianOS. Nokia series 60 only. Try it!
* MatrixRemover Matrix has you. Remove matrix!
* Nokia ringtoner Nokia RingtoneManager for all models.
* PocketPCemu PocketPC *REAL* emulator for Symbvian OS! Nokia only.
* Porno images Porno images collection with nice viewer!
* PowerSave Inspector Save you battery and *MONEY*!
* Security update #12 Significant security update. See www.symbian.com
* Symbian security update See security news at www.symbian.com
* SymbianOS update OS service pack #1 from Symbian inc.
* Virtual SEX Virtual SEX mobile engine from Russian hackers!
* WWW Cracker Helps to *CRACK* WWW sites like hotmail.com



Removal Instruction at

?\system\apps\CommWarrior\commwarrior.exe
?\system\apps\CommWarrior\commrec.mdl
?\system\updates\commwarrior.exe
?\system\updates\commrec.mdl
?\system\updates\commw.sis
Trojan.SymbOS.Appdisabler.a

This Trojan infects mobile phones running Symbian.
The Trojan substitutes non-functional files for some system applications.
The Trojan itself is an SIS installer file for Symbian 60 Series.
The file is 31210 bytes in size, and may be called freetalktime.sis.

Dimana?
Ada 53 File :

? aghu.txt (275 bytes)
?Images aghu.txt (275 bytes)
?Images aghu crack.jpg (12554 bytes)
?systemapps
A-RAGHU.txt (201 bytes)
?systemappsRAGHU aghu.app (6864 bytes)
?systemappsRAGHUMenu aghumenu.app (5332 bytes)
?systemappsRAGHUMenu aghumenu.rsc (60 bytes)
?systemappsRAGHUMenuRAGHUMenu_caption.rsc (28 bytes)

This pict is the owner of this malware.



?systemappsAD7650
?systemappsAnswRec
?systemappsBlackList
?systemappsBlueJackX
?systemappscallcheater
?systemappsCallManager
?systemappsCamcoder
?systemappscamerafx
?systemappsETICamcorder
?systemappsETIMovieAlbum
?systemappsETIPlayer
?systemappsextendedrecorder
?systemappsFaceWarp
?systemappsFExplorer
?systemappsFSCaller
?systemappsHair
?systemappsHantroCP
?systemappsirremote
?systemappsJelly
?systemappsKPCaMain
?systemappsLauncher
?systemappslogoMan
?systemappsMIDIED
?systemappsmmp
?systemappsMp3Go
?systemappsMp3Player
?systemappsphotoacute
?systemappsPhotoEditor
?systemappsPhotographer
?systemappsPhotoSafe
?systemappsPhotoSMS
?systemappsPVPlayer
?systemappsRallyProContest
?systemapps ealplayer
?systemappsRingMaster
?systemappsSmartAnswer
?systemappsSmartMovie
?systemappsSmsMachine
?systemappsSounder
?systemappssSaver
?systemappsSystemExplorer
?systemappsUltraMP3
?systemappsUVSMStyle
?systemappsWILDSKIN

Ni text yg ada di pilus :

Code:
----R A G H U----

VIRUS BORN IN SURAT(GUJRAT/INDIA/ASIA).

THE NAME OF THIS VIRUS IS RAGHU....
U KNOW WHY....????????

BECAUSE I LIKE VASTAV MOVIE AND SANJU BABA.

U LIKE THIS VIRUS?

SO MANY SOFTWARE CRACKS AND VIRUS AVAILABLE SOON....

RAGHU NAM HE RAGHU...



Removal Instruction at

above
Trojan-SMS.J2ME.RedBrowser.a

This Trojan infects mobile phones running Java (J2ME).
The Trojan spreads in the guise of a program called "RedBrowser",
which allegedly enables the user to visit WAP sites without using a WAP connection.
According to the Trojan's author, this is made possible by sending and receiving free SMSs.
In a
ctual fact, the Trojan only sends SMSs to premium rate numbers, at a rate of $5 - $6 per SMS.
The Trojan is a Java application, a JAR format archive.
The file may be called "redbrowser.jar", and is 54482 bytes in size.
The Trojan can be downloaded to the victim handset either via the Internet (from a WAP site)
or via Bluetooth or a personal computer.
Dimana?

* FS.class - auxiliary file (2719 bytes in size)
* FW.class - auxiliary file (2664 bytes in size)
* icon.png - grap
hics file (3165 bytes in size)
* logo101.png - graphics file (16829 bytes in size)
* logo128.pnh - graphics file (27375 bytes in size)
* M.class - interface file (5339 bytes in size)
* SM.class - Trojan application which sends SMS messages (1945 bytes in size)


Removal Instruction at


Actually, if you already run this App, just press Off Call or Off phone then go to App Manager > Uninstall it immediately.
Trojan:SymbOS/Blankfont.A
BlankFont.a is a SIS file trojan that installs a corrupted Font file.

Just like this if i installed it.



then it will put the File *.gdr on



Code:
C:\System\Fonts\Panic.gdr
removal instruction

Open any File Explorer like X-Plore, then go to that Folder and rename it to anything what you want. Reboot, go to that Folder again and Delete the Folder.
Botton.a

This Trojan is unknown bcouse i haven't installed it.

Then, if i installed it will put the files on :
Code:
C:\System\apps\Appctrl\Appctrl.app
C:\System\apps\Appctrl\Appctrl.aif
C:\System\apps\Appctrl\Appinst.app
C:\System\apps\Appctrl\Appinst.aif
C:\System\apps\Appinst\Appmngr.app
C:\System\apps\Appinst\Appmngr.aif
C:\System\apps\BtUi\BtUi.app
C:\System\apps\BtUi\BtUi.aif
C:\System\apps\Camcorder\Camcorder.app
C:\System\apps\CamcorderCamcorder.aif
C:\System\apps\Camera\Camera.app
C:\System\apps\Camera\Camera.aif
C:\System\apps\efileman\efileman.app
C:\System\apps\efileman\efileman.aif
C:\System\apps\FExplorer\FExplorer.app
C:\System\apps\FExplorer\FExplorer.aif
C:\System\apps\FExplorer\FExplorer_caption.rsc
C:\System\apps\File\File.app
C:\System\apps\File\File.aif
C:\System\apps\FileManager\FileManager.app
C:\System\apps\FileManager\FileManager.aif
C:\System\apps\ILoveU\ILoveU.app
C:\System\apps\ILoveU\ILoveU.aif
C:\System\apps\ILoveU\ILoveU.RSC
C:\System\apps\ILoveU\ILU.mdl
C:\System\apps\IrApp\IrApp.app
C:\System\apps\IrApp\IrApp.aif
C:\System\apps\Logs\Logs.app
C:\System\apps\Logs\Logs.aif
C:\System\apps\mce\mce.app
C:\System\apps\mce\mce.aif
C:\System\apps\MediaGallery\MediaGallery.app
C:\System\apps\MediaGallery\MediaGallery.aif
C:\System\apps\Menu\Menu.app
C:\System\apps\Menu\Menu.aif
C:\System\apps\Phone\Phone.app
C:\System\apps\Phone\Phone.aif
C:\System\apps\Phonebook\Phonebook.app
C:\System\apps\Phonebook\Phonebook.aif
C:\System\apps\SymCommander\SymCommander.app
C:\System\apps\SymCommander\SymCommander.aif
C:\System\apps\SystemExplorer\SystemExplorer.app
C:\System\apps\SystemExplorer\SystemExplorer.aif
C:\System\RECOGS\ILU.mdl
C:\System\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\Dont4get2readme.txt
The *.txt files showed us :
Code:
Saying HELLO From Here (SYRIA)
TO All The WORLD !!!
I Wish U N-Joy UR
Damaged Device ..
U Know, Not all may Read These Words But,
No Problem Bcuz Some will,
But even This, Thats The Way I Love U All ...
;-)
Regards,
ThNdRbRd
Removal Instruction above





Cadomesk.A

This is a Symbian Series 60 trojan that installs Cabir, Skulls, Doomboot, and Bootton trojan into the Series 60 handsets.

Trojan tested using NOKIA 6680 ( Symbian OS 8.0)

Positive analysis results:

This trojan is prove to be succeed performs its malicious activities in NOKIA 6680. As usual, this trojan applied skulls technique to disable some of the application in the phone by replacing non-functional or corrupted files with the original one. However, some of the application still working because those files was replaced by Booton.A trojan which changed the actual icon of the application into a love icon while the application is still working. This malware also drops doomboot.A trojan in the process while attacking the phone. After my phone has been restarted, when accessing the menu system, my phone auto restart. McAfee AVERT (Anti-Virus Emergency Responding Team) mentioned that this trojan will disable the phone from startup but I notice that it does not successfully perform its action in NOKIA 6680.



Where ?
Code:
?:\System\Apps\About\About.app
?:\System\Apps\About\About.aif
?:\System\Apps\AntiVirus\AntiVirus.app
?:\System\Apps\Anti-Virus\backup\AVBioIcons.mbm
?:\System\Apps\Anti-Virus\backup\FSBioMessage.bif
?:\System\Apps\Anti-Virus\backup\FSBioMessageParser.dll
?:\System\Apps\Anti-Virus\Anti-Virus.app
?:\System\Apps\Anti-Virus\Anti-Virus.aif
?:\System\Apps\Anti-Virus\Anti-Virus.rsc
?:\System\Apps\Anti-Virus\FSAV.dll
?:\System\Apps\Anti-Virus\FSAVDT.exe
?:\System\Apps\Anti-Virus\FSAVEPOC.DAT
?:\System\Apps\Anti-Virus\FsAVUpdater.aif
?:\System\Apps\Anti-Virus\FsAVUpdater.app
?:\System\Apps\Anti-Virus\FsAVUpdater.rsc
?:\System\Apps\Anti-Virus\FSSched.aif
?:\System\Apps\Anti-Virus\FSSched.app
?:\System\Apps\Anti-Virus\FSSched.rsc
?:\System\Apps\Anti-Virus\FSSMSManager.dll
?:\System\Apps\Anti-Virus\FSUpdateManager.dll
?:\System\Apps\Anti-Virus\Hydra1.DLL
?:\System\Apps\Appctrl\Appctrl.app
?:\System\Apps\Appctrl\Appctrl.aif
?:\System\Apps\AppInst\AppInst.app
?:\System\Apps\AppInst\AppInst.aif
?:\System\Apps\AppMngr\AppMngr.app
?:\System\Apps\AppMngr\AppMngr.aif
?:\System\Apps\Autolock\Autolock.app
?:\System\Apps\Autolock\Autolock.aif
?:\System\Apps\bootdata\bootdata.app
?:\System\Apps\bootdata\bootdata.aif
?:\System\Apps\Browser\Browser.app
?:\System\Apps\Browser\Browser.aif
?:\System\Apps\BtUi\BtUi.app
?:\System\Apps\BtUi\BtUi.aif
?:\System\Apps\bva\bva.app
?:\System\Apps\bva\bva.aif
?:\System\Apps\cabirfix\cabirfix.app
?:\System\Apps\Calcsoft\Calcsoft.app
?:\System\Apps\Calcsoft\Calcsoft.aif
?:\System\Apps\Calendar\Calendar.app
?:\System\Apps\Calendar\Calendar.aif
?:\System\Apps\Camcorder\Camcorder.app
?:\System\Apps\Camcorder\Camcorder.aif
?:\System\Apps\Camera\Camera.app
?:\System\Apps\Camera\Camera.aif
?:\System\Apps\CbsUiApp\CbsUiApp.app
?:\System\Apps\CbsUiApp\CbsUiApp.aif
?:\System\Apps\CERTSAVER\CERTSAVER.app
?:\System\Apps\CERTSAVER\CERTSAVER.aif
?:\System\Apps\Chat\Chat.app
?:\System\Apps\Chat\Chat.aif
?:\System\Apps\ClockApp\ClockApp.app
?:\System\Apps\ClockApp\ClockApp.aif
?:\System\Apps\CodViewer\CodViewer.app
?:\System\Apps\CodViewer\CodViewer.aif
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.app
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.aif
?:\System\Apps\Converter\Converter.app
?:\System\Apps\Converter\Converter.aif
?:\System\Apps\cshelp\cshelp.app
?:\System\Apps\cshelp\cshelp.aif
?:\System\Apps\data\data.app
?:\System\Apps\data\data_CAPTION.rsC
?:\System\Apps\DdViewer\DdViewer.app
?:\System\Apps\DdViewer\DdViewer.aif
?:\System\Apps\Decabir\Decabir.app
?:\System\Apps\Dictionary\Dictionary.app
?:\System\Apps\Dictionary\Dictionary.aif
?:\System\Apps\Disinfect\Disinfect.app
?:\System\Apps\efileman\efileman.app
?:\System\Apps\efileman\efileman.aif
?:\System\Apps\FExplorer\FExplorer.app
?:\System\Apps\FExplorer\FExplorer.aif
?:\System\Apps\FExplorer\FExplorer_caption.rsc
?:\System\Apps\file\File.app
?:\System\Apps\file\File.aif
?:\System\Apps\FileManager\FileManager.app
?:\System\Apps\FileManager\FileManager.aif
?:\System\Apps\FileView\FileView.app
?:\System\Apps\FileView\FileView.aif
?:\System\Apps\freakappctrl\freakappctrl.app
?:\System\Apps\freakbtui\freakbtui.app
?:\System\Apps\GS\gs.app
?:\System\Apps\GS\GS.aif
?:\System\Apps\ILoveU\ILoveU.app
?:\System\Apps\ILoveU\ILoveU.aif
?:\System\Apps\ILoveU\ILoveU.rsc
?:\System\Apps\ILoveU\ILU.mdl
?:\System\Apps\ImageViewer\ImageViewer.app
?:\System\Apps\ImageViewer\ImageViewer.aif
?:\System\Apps\IrApp\IrApp.app
?:\System\Apps\IrApp\IrApp.aif
?:\System\Apps\location\location.app
?:\System\Apps\location\location.aif
?:\System\Apps\Logs\Logs.app
?:\System\Apps\Logs\Logs.aif
?:\System\Apps\mce\mce.app
?:\System\Apps\mce\mce.aif
?:\System\Apps\MediaGallery\MediaGallery.app
?:\System\Apps\MediaGallery\MediaGallery.aif
?:\System\Apps\MediaPlayer\MediaPlayer.app
?:\System\Apps\MediaPlayer\MediaPlayer.aif
?:\System\Apps\MediaSettings\MediaSettings.app
?:\System\Apps\MediaSettings\MediaSettings.aif
?:\System\Apps\Menu\Menu.app
?:\System\Apps\Menu\Menu.aif
?:\System\Apps\mmcapp\mmcapp.app
?:\System\Apps\mmcapp\mmcapp.aif
?:\System\Apps\MMM\MMM.app
?:\System\Apps\MMM\MMM.aif
?:\System\Apps\MmsEditor\MmsEditor.app
?:\System\Apps\MmsEditor\MmsEditor.aif
?:\System\Apps\MmsViewer\MmsViewer.app
?:\System\Apps\MmsViewer\MmsViewer.aif
?:\System\Apps\MsgMailEditor\MsgMailEditor.app
?:\System\Apps\MsgMailEditor\MsgMailEditor.aif
?:\System\Apps\MsgMailViewer\MsgMailViewer.app
?:\System\Apps\MsgMailViewer\MsgMailViewer.aif
?:\System\Apps\MusicPlayer\MusicPlayer.app
?:\System\Apps\MusicPlayer\MusicPlayer.aif
?:\System\Apps\nokiaapps\nokiaapps.app
?:\System\Apps\nokiaapps\nokiaapps.aif
?:\System\Apps\nokiafile\nokiafile.app
?:\System\Apps\nokiafile\nokiafile.aif
?:\System\Apps\Notepad\Notepad.app
?:\System\Apps\Notepad\Notepad.aif
?:\System\Apps\NpdViewer\NpdViewer.app
?:\System\Apps\NpdViewer\NpdViewer.aif
?:\System\Apps\NSmlDMSync\NSmlDMSync.app
?:\System\Apps\NSmlDMSync\NSmlDMSync.aif
?:\System\Apps\NSmlDSSync\NSmlDSSync.app
?:\System\Apps\NSmlDSSync\NSmlDSSync.aif
?:\System\Apps\OIDI500\OIDI500.app
?:\System\Apps\OIDI500\OIDI500.aif
?:\System\Apps\OIDI500\OIDI500.rsc
?:\System\Apps\OIDI500\OIDI500.mdl
?:\System\Apps\Phone\Phone.app
?:\System\Apps\Phone\Phone.aif
?:\System\Apps\Phonebook\Phonebook.app
?:\System\Apps\Phonebook\Phonebook.aif
?:\System\Apps\Pinboard\Pinboard.app
?:\System\Apps\Pinboard\Pinboard.aif
?:\System\Apps\pjBLUE\pjBLUE.app
?:\System\Apps\pjBLUE\pjBLUE.aif
?:\System\Apps\pjBLUE\pjBLUE_CAPTION.rsc
?:\System\Apps\PRESENCE\PRESENCE.app
?:\System\Apps\PRESENCE\PRESENCE.aif
?:\System\Apps\ProfiExplorer\ProfiExplorer.app
?:\System\Apps\ProfiExplorer\ProfiExplorer.aif
?:\System\Apps\ProfileApp\ProfileApp.app
?:\System\Apps\ProfileApp\ProfileApp.aif
?:\System\Apps\ProvisioningCx\ProvisioningCx.app
?:\System\Apps\ProvisioningCx\ProvisioningCx.aif
?:\System\Apps\PSLN\PSLN.app
?:\System\Apps\PSLN\PSLN.aif
?:\System\Apps\PushViewer\PushViewer.app
?:\System\Apps\PushViewer\PushViewer.aif
?:\System\Apps\Satui\Satui.app
?:\System\Apps\Satui\Satui.aif
?:\System\Apps\SchemeApp\SchemeApp.app
?:\System\Apps\SchemeApp\SchemeApp.aif
?:\System\Apps\ScreenSaver\ScreenSaver.app
?:\System\Apps\ScreenSaver\ScreenSaver.aif
?:\System\Apps\Sdn\Sdn.app
?:\System\Apps\Sdn\Sdn.aif
?:\System\Apps\SimDirectory\SimDirectory.app
?:\System\Apps\SimDirectory\SimDirectory.aif
?:\System\Apps\SmartFileMan\SmartFileMan.app
?:\System\Apps\SmartFileMan\SmartFileMan.aif
?:\System\Apps\smartmovie\smartmovie.app
?:\System\Apps\SmsEditor\SmsEditor.app
?:\System\Apps\SmsEditor\SmsEditor.aif
?:\System\Apps\SmsViewer\SmsViewer.app
?:\System\Apps\SmsViewer\SmsViewer.aif
?:\System\Apps\Speeddial\Speeddial.app
?:\System\Apps\Speeddial\Speeddial.aif
?:\System\Apps\Startup\Startup.app
?:\System\Apps\Startup\Startup.aif
?:\System\Apps\SymCommander\SymCommander.app
?:\System\Apps\SymCommander\SymCommander.aif
?:\System\Apps\SysAp\SysAp.app
?:\System\Apps\SysAp\SysAp.aif
?:\System\Apps\SystemExplorer\SystemExplorer.app
?:\System\Apps\SystemExplorer\SystemExplorer.aif
?:\System\Apps\Tee222\Tee222.app
?:\System\Apps\Tee222\Tee222.aif
?:\System\Apps\Tee222\Tee222.rsc
?:\System\Apps\Tee222\Tee222_CAPTION.rsc
?:\System\Apps\Tee222\222.mdl
?:\System\Apps\ToDo\ToDo.app
?:\System\Apps\ToDo\ToDo.aif
?:\System\Apps\UltraMP3\UltraMP3.app
?:\System\Apps\UltraMP3\UltraMP3.aif
?:\System\Apps\Ussd\Ussd.app
?:\System\Apps\Ussd\Ussd.aif
?:\System\Apps\VCommand\VCommand.app
?:\System\Apps\VCommand\VCommand.aif
?:\System\Apps\velasco\velasco.app
?:\System\Apps\velasco\velasco.rsc
?:\System\Apps\velasco\marcos.mdl
?:\System\Apps\Vm\Vm.app
?:\System\Apps\Vm\Vm.aif
?:\System\Apps\Voicerecorder\Voicerecorder.app
?:\System\Apps\Voicerecorder\Voicerecorder.aif
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.app
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.aif
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.app
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.aif
?:\System\data\0010155.cfg
?:\System\Fonts\DFT.gdr
?:\System\Fonts\ETel.dll
?:\System\Recogs\$$$.MDL
?:\System\Recogs\mod.MDL
?:\System\Recogs\FSRec.mdl
?:\System\Recogs\YYSBootRec.mdl
?:\System\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\METALG.SIS
?:\ETel.dll
?:\nokia\imags\nokias\DFT God Damn'it!!!\DFT the creator!!!!!.gif
Delete all those
Dampig.a


Dampig.A is a malicious SIS file dropper, that pretends to be a crack for version 3.2 of FSCaller application. The Dampig.A disables some system applications and third party file managers and installs several variants of Cabir worm on the phone.
The Dampig.A trojan disables Bluetooth UI, system file manager, Messaging application and phone book on the infected handheld. Also the Dampig.A will corrupt the uninstallation information in the system installer, so that it cannot be uninstalled without being disinfected first.
The menu application is not disabled, so the user is able to use his phone, and download Anti-Virus to disinfect the phone without any special tool.
None of the Cabir variants installed on the phone will start automatically, but some of the applications that are replaced with Cabir executables, such as Messaging application, will be most likely called and thus executed by the user.
All of the Cabir variants worm dropped by Dampig.A are already detected. So the Dampig.A is already detected and stopped without need for updated Anti-Virus database.
Please note, that even as the FSCaller application that Dampig.A prenteds to crack, has similar name to our product naming. It has nothing to do with F-Secure. FSCaller is software made by SymbianWare OHG in Germany.
Installation to system

When installed Dampig.A will replace most common third party file managers, and key system applications with non-functional versions.

Spreading in

Fscaller3.2Crack7610.sis or vir.sis
Payload

Disables following applications


Bluetooth UI
Camera
FExplorer
Messaging
Phonebook
SmartFileManager
Smartmovie
SystemExplorer
UltraMP3



Where ?
Code:
?:\system\apps\BtUi\BtUi.app
?:\system\apps\BtUi\BtUi.aif
?:\system\apps\BtUi\BtUi.R01
?:\system\apps\BtUi\BtUi.R13
?:\system\apps\BtUi\BtUi_CAPTION.r01
?:\system\apps\BtUi\BtUi_CAPTION.R13
?:\system\apps\Camcoder\Camcoder.app
?:\system\apps\Camcoder\Camcoder.aif
?:\system\apps\Camcoder\Camcoder.rsc
?:\system\apps\Camcoder\Camcoder_CAPTION.rsc
?:\system\apps\Camcoder\flo.mdl
?:\system\apps\FExplorer\FExplorer.app
?:\system\apps\FExplorer\FExplorer.aif
?:\system\apps\FExplorer\FExplorer.rsc
?:\system\apps\FExplorer\FExplorer_CAPTION.rsC
?:\system\apps\FExplorer\flo.mdl
?:\system\apps\File\File.app
?:\system\apps\File\File.aif
?:\system\apps\File\File.rsc
?:\system\apps\File\File_CAPTION.rsC
?:\system\apps\File\flo.mdl
?:\system\apps\FREAKBtUi\FREAKBtUi.app
?:\system\apps\FREAKBtUi\FREAKBtUi.aif
?:\system\apps\FREAKBtUi\FREAKBtUi.R01
?:\system\apps\FREAKBtUi\FREAKBtUi.R13
?:\system\apps\FREAKBtUi\FREAKBtUi_CAPTION.r01
?:\system\apps\FREAKBtUi\FREAKBtUi_CAPTION.R13
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.app
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.aif
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.R01
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.R13
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook_CAPTION.r01
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.R13
?:\system\apps\iLoveU\iLoveU.app
?:\system\apps\iLoveU\iLoveU.aif
?:\system\apps\iLoveU\iLoveU_CAPTON.rsc
?:\system\apps\iLoveU\iLoveU.rsc
?:\system\apps\iLoveU\flo.mdl
?:\system\apps\MCE\MCE.app
?:\system\apps\MCE\mce.aif
?:\system\apps\MCE\MCE.R01
?:\system\apps\MCE\MCE.R13
?:\system\apps\MCE\MCE_CAPTION.r01
?:\system\apps\MCE\MCE_CAPTION.R13
?:\system\apps\PhoneBook\PhoneBook.app
?:\system\apps\PhoneBook\PhoneBook.aif
?:\system\apps\PhoneBook\PhoneBook.R01
?:\system\apps\PhoneBook\PhoneBook.R13
?:\system\apps\PhoneBook\PhoneBook_CAPTION.r01
?:\system\apps\PhoneBook\PhoneBook_CAPTION.R13
?:\system\apps\SmartFileMan\SmartFileMan.app
?:\system\apps\SmartFileMan\SmartFileMan.aif
?:\system\apps\SmartFileMan\SmartFileMan.rsc
?:\system\apps\SmartFileMan\SmartFileMan_CAPTION
?:\system\apps\SmartFileMan\flo.mdl
?:\system\apps\SmartMovie\SmartMovie.app
?:\system\apps\SmartMovie\SmartMovie.aif
?:\system\apps\SmartMovie\SmartMovie.rsc
?:\system\apps\SmartMovie\SmartMovie_CAPTION.rsc
?:\system\apps\SmartMovie\flo.mdl
?:\system\apps\SystemExplorer\SystemExplorer.app
?:\system\apps\SystemExplorer\SystemExplorer.aif
?:\system\apps\SystemExplorer\SystemExplorer.rsc
?:\system\apps\SystemExplorer\SystemExplorer_CAPTION.rsc
?:\system\apps\SystemExplorer\flo.mdl
?:\system\apps\UltraMP3\UltraMP3.app
?:\system\apps\UltraMP3\UltraMP3.aif
?:\system\apps\UltraMP3\UltraMP3_CAPTION.rsc
?:\system\apps\UltraMP3\UltraMP3.rsc
?:\system\apps\UltraMP3\flo.mdl
?:\system\install\autoexecdaemon.SIS
Kill the Cabir variants that are currently running in the system:
1. Press menu button until you get a list of running applications
2. Kill all applications that look suspicious by pressing 'C' button
Mabir.A
Viruses for mobile phones were developed at first to prove that it is possible, but the new versions have become more and more aggressive.

After Cabir and Commwarrior have showed that viruses for the Symbian Series 60 operating system can spread through MMS, a new virus attacks smartphones: Mabir.A.

Discovered by F-Secure, MabirA has a very interesting spreading procedure.
Instead of reading addresses and phone numbers, Mabir.A intercepts all SMS and MMS messages.
Immediately, the virus will be sent as a MMS message to the number that sent the initial message; the receivers will assume that the message is a reply.

After analyzing the virus, the F-Secure experts have reached the conclusion that the ones responsible for the Cabir virus are also responsible for the new virus. MabirA is derived from the same source code as Cabir.

The fact that viruses aimed at cell phones are targeting MMSs is very troubling considering the costs involved in sending such a message from one network to another or from one country to another.

Moreover, the fact that the new version appears only a few weeks after Cabir is a sign that those involved might prepare other surprises.

Like the first versions of Cabir, Mabir.A is also able to spread through Bluetooth; the virus searches for the closest phone and sends a copy of the virus.



Where ?
Code:
?:\system\apps\caribe\caribe.rsc
?:\system\apps\caribe\flo.mdl
?:\system\apps\carfibe\caribe.app
Locknut.B


Locknut.B is a malicious SIS file trojan that pretends to be patch for Symbian Series 60 mobile phones.

When installed Locknut.B drops a binary that will crash a critical System component, that will prevent any application from being launched in the phone. Thus effectively locking the phone.
The Locknut.B will also drop a copy of Cabir.V into the device, but it will not start automatically. And is harmless anyway as the Locknut.B kills all applications on the infected phone, including Cabir.V that is installed from the same SIS file.

Even if Locknut.B is disinfected the Cabir.V still wont start, as it is installed into wrong directory in the infected phone.

If user starts Cabir.V manually, after disinfecting locknut, the Cabir.V will spread as pure Cabir.V and will not transfer Locknut.B into other devices.


Where ?
Code:
?:\system\Apps\Gavnoreturn\gavnoreturn.app
?:\system\Apps\Gavnoreturn\gavnoreturn.rsc
?:\system\Apps\Gavnoreturn\gavnoreturn_caption.rsc
Spreading in MMFpatch.sis

Locknut.B drops corrupted binary file that will cause crash in a critical operating system component. The locknut.B also drops Cabir.V, which does not start on the phone, unless executed on purpose after disinfection.
Locknut.A

Locknut.A is a malicous SIS file trojan that prentends to be patch for Symbian Series 60 mobile phones.



When installed Locknut.A drops binaries that will crash a critical System component, that will prevent any application from being launched in the phone. Thus effectively locking the phone.




There are also claims that Locknut would disable calling functionality, so that user couldn't make calls with infected
phone. But we could not reproduce this effect with any phones we have.

Also Locknut.A will only work with devices that have Symbian OS 7.0S or newer, devices that use Symbian OS 6.0 or 6.1 are unaffected.

Locknut is targeted against Symbian Series 60 devices, but also series 70 devices, such as Nokia 7710 are vulnerable to Locknut. However when trying to install Skulls trojan on Nokia 7710, user will get a warning that the SIS file is not intended for the device, so risk of accidental infection is low.

Some AV companies call this trojan Gavno, but since this word means rather vulgar term in Russian. AV community has decided to rename it as
Locknut.

There are also versions of Locknut that include Cabir.B in same SIS file, that some companies call Gavno.B. But since the actual trojan functionality is totally identical to Locknut.A we call both samples Locknut.A

The Cabir.B included in the Locknut.A samples is harmless as the Locknut kills all applications on the infected phone, including Cabir.B that is installed from the same SIS file.

Even if Locknut.B is disinfected the Cabir.B still wont start, as it is installed into wrong directory in the infected phone.

If user starts Cabir.B manually, after disinfecting locknut, the
Cabir.B will spread as pure Cabir.B and will not transfer Locknut.A into other devices.




Where ?
Code:
?:\system\Apps\caribe\caribe.aif
?:\system\Apps\caribe\caribe.app
?:\system\Apps\caribe\flo.mdl
?:\system\Apps\gavno\gavno.App
?:\system\Apps\gavno\gavno.Rsc
?:\system\Apps\gavno\gavno_caption.rsc
?:\system\CARIBESECURITYMANAGER\caribe.app
?:\system\CARIBESECURITYMANAGER\caribe.rsc
?:\system\CARIBESECURITYMANAGER\caribe.sis
?:\system\RECOGS\flo.mdl
1. Install f-Locknut.sis into infected phones memory card with a clean phone
2. Put the memory card with F-Locknut into infected phone
3. Start up the infected phone, the application menu should work now
4. Go to application manager and uninstall the SIS file in which you installed the locknut variant
Attached Files
File Type: sis
f-locknut.sis (4.1 KB, 20 views)
Hobbes.A

Hobbes.A is a malicious SIS file trojan that drops corrupted binary that causes the application loader to crash on older phones that use Symbian OS.

The Hobbes.A affects only phones that use Symbian OS version 6.1, which means that only old models such as Nokia NGage and Nokia 3650 are affected by the trojan.


Hobbes.A pretends to be a pirated copy of Symantec Anti-Virus for Symbian phones. The installation package contains texts that instruct user to reboot after installation.



The corrupted binary in Hobbes.A causes OS to fail at boot so that none of the system applications are started. This means that all smartphone functionalities are disabled, calling and receiving calls on the phone works as normal.
Users who have a phone that is infected with Hobbes.A must not reboot their phone, as the damage caused by Hobbes.A is activated only on reboot.

When installed to the system the Hobbes.A installs corrupted version of FExplorer trying to disable FExplorer file manager, but fails as it installs it into incorrect directory.

Hobbes.A also installs several recognizer components to C: and E: drives, one of the components is a corrupted version of legitimate application which is missing it's other components and thus crashing on boot on older Symbian versions.


Where ?
Code:
?:\apps\FExplorer\FExplorer.aif
?:\apps\FExplorer\FExplorer.app
?:\apps\FExplorer\FExplorer.rsc
?:\apps\FExplorer\FExplorer_CAPTION.rsC
?:\apps\FExplorer\flo.mdl >> always use this? :d
?:\system\recogs\jjlas.mdl
?:\system\recogs\RecAppForge.mdl >> Fake of AppBooster
E:\system\apps\FExplorer\FExplorer.mbm
E:\system\recogs\recAutoExec.mdl
E:\system\recogs\UltraMP3Rec.mdl >> we will think this is really from UltraMP3. :D
1. Uninstall the Symantec.sis using application manager

Disinfection is user has rebooted the phone

2. Remove memory card from the phone and boot it again
3. Install some file manager on the phone
4. Go to the memory card and delete file \system\recogs\recAutoExec.mdl
3 SIMPLE STEPS TO REMOVE THIS VIRUS..
If your phone is infected by beselo,it will build some file with randomly name on C/ and E/system/apps/xxxx.Exe and xxxx.Sis(ussually on bottom of apps folder)
all you need is an explorer apps (x-plore or another apps like Fexplorer)first,you must set your
x-plore or Fexplorer to be enable to see hidden and system file.

Here we go,it will take a bit of time,just 3 simple steps...
Step1:
just try to delete this item:
=>C/system/recogs
=>E/system/recogs
note: if you worry about
it,before delete this FOLDER,u can move/back them up into another folder.
This is the key "YOU MUST CERTAINLY DELETE/MOVE THIS FOLDER FROM SYSTEM FOLDER,MAKE THIS FOLDER DISSAPEAR FROM YOUR SYSTEM FOLDER"

step 2:
RESTART your phone

step 3:
using your x-plore again,delete this following item(you have to quick before it works again):
=>C/ and E/system/apps/[xxxxx.Sis] and [xxxxx.Exe]
=>C/system/data/xxxxx.Exe
=>C/system/mail/Mailserver.Exe(under INDEX file)

note:why you must restart your phone?
Because this file [xxxxx.Sis] and [xxxxx.Exe],it can't be deleted, before you RESTART your phone,it will appears and appears again....
Already tested on s60v1 and v2
Code:
http://www.dotsis.com/mobile_phone/showthread.php?t=127798

SymbOS/RommWar.A

is a malicious SIS trojan that installs a malfunctioning system component that cause different behaviour depending on the ROM software version in the device. Different effects witnessed range from freezing of the device requiring a restart, to disabling the power button on the device, or in some cases no apparent effect on device at all.

When a user opens this file, the phone installer will display a dialog to warn users that the application may be coming from an untrusted source and may cause potential problems.



In the case of freezing the device, shortly after the device infected with SymbOS/RommWar.A restarts, it shows a notification similar to the picture above. When this notification is displayed the only working function on the device is the option to power-off.

Depending on the effect caused by SymbOS/RommWar.A, removal of the malfunctioning components might be possible by going to application manager and uninstalling the SIS file in which SymbOS/RommWar.A arrived.

Z:\System\Apps\Startup\Startup.r02 infected with Trojan.SymbOS.RommWar.a
Z:\System\Apps\Startup\Startup.app infected with Trojan.SymbOS.RommWar.a

I also trying this one on my other phone and i haven't knew that malware.
A malware infect a ROM area?
I think that alarm Antivirus is just a false alarm.
You must have installed KAV_Mobile_s602nd_v_6_0_80_en.sis on your phone.

MGDropper.A


MGDropper is a malicious SIS file dropper, that disables most well known third party file managers and Anti-Virus software and installs Cabir.G worm on the phone.
The Cabir.G is started automatically when the MGDropper is installed and will start spreading. When Cabir.G spreads from MGDropper infected phone, the SIS files it sends will contain only the Cabir.G not MGDropper. However the MGDropper also installs the Cabir.G into different directory as SEXXXY.SIS, which also disables phone menu application.
MGDropper tries to disable F-Secure Mobile Anti-Virus by replacing it's files with non-functional versions. However as F-Secure Mobile Anti-Virus is capable of detecting Cabir.G contained by MGDropper using generic detection. The Anti-Virus will detect the infected SIS file and prevent it from being installed. Provided that the Anti-Virus is in realtime scan mode as it is by default.
The Cabir.G worm dropped by MGDropper is already detected with generic detection as Cabir.Gen. So the MGDropper is already detected and stopped without need for updated Anti-Virus database.
Where is ?

Code:
C:\System\Apps\Antivirus\Antivirus.app
C:\System\Apps\Anti-Virus\Anti-Virus.app
C:\System\Apps\Anti-Virus\FsVUpdater.app
C:\System\Apps\AppInst\Appinst.aif
C:\System\Apps\AppInst\Appinst.app
C:\System\Apps\cabirfix\cabirfix.app
C:\System\Apps\Decabir\DECABIR.APP
C:\System\Apps\Disinfect\Disinfect.app
C:\System\Apps\FExplorer\FExplorer.app
C:\System\Apps\file\file.app
C:\System\Apps\OIDI500\OIDI500.aif
C:\System\Apps\OIDI500\OIDI500.mdl
C:\System\Apps\OIDI500\OIDI500.rsc
C:\System\Apps\smarfileman\smartfileman.app
C:\System\Apps\SystemExplorer\SystemExplorer.app
C:\System\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\METALG.SIS
E:\System\Apps\Antivirus\Antivirus.app
E:\System\Apps\Anti-Virus\Anti-Virus.app
E:\System\Apps\Anti-Virus\FsVUpdater.app
E:\System\Apps\AppInst\Appinst.aif
E:\System\Apps\AppInst\Appinst.app
E:\System\Apps\cabirfix\cabirfix.app
E:\System\Apps\Decabir\DECABIR.APP
E:\System\Apps\Disinfect\Disinfect.app
E:\System\Apps\FExplorer\FExplorer.app
E:\System\Apps\file\file.app
E:\System\Apps\smarfileman\smartfileman.app
E:\System\Apps\SystemExplorer\SystemExplorer.app


When installed MGDropper will replace most common third party file managers, Anti-Virus programs and application installer with non-functional versions.


Payload Disables following applications


Simworks Anti-Virus
F-Secure Mobile Anti-Virus
Application installer
Cabirfix
Decabir
F-Cabir
FExplorer
File manager
Smart file manager
System Explorer


Code:

 For full disinfection of MGDropper you need help of another Series 60 phone that is not infected with the trojan, and clean memory card on that phone.

Onehop.A
Onehop.A is a Symbian SIS file trojan that causes device to reboot when trying to use system applications and sends copies to SymbOS/Bootton.A trojan to first device it finds with bluetooth.
In its structure Onehop.A is quite similar to Skulls family trojans. With the exception that instead of replacing system files with corrupted binaries,the Onehop.A uses application that causes device to reboot.
Thus if a device is infected with Onehop.A, pressing menu button or any system application button the device immediately reboots.
Onehop.A disables most of critical system functions and third party file managers, so that even if the device wouldn't immediately reboot it is still unusable before it is disinfected.
In addition of disabling applications on the phone, uses a modified version of cabir as distribution component for SymbOS/Bootton.A. So that first phone that is found over bluetooth receives Bootton.A over bluetooth if the user accepts connection. The modified Cabir that Onehop.A infects the device with is incapable of spreading, so it is detected as component of Onehop.A not as separate malware.
Like Skulls.A the Onehop.A replaces the application icons with it's own icon, this time the icon is a heart icon with the text "I-Love-U"
Where is ?

Code:
C:\system\apps\Appctrl\Appctrl.aif
C:\system\apps\Appctrl\Appctrl.app
C:\system\apps\Appinst\Appinst.aif
C:\system\apps\Appinst\Appinst.app
C:\system\apps\Appmngr\Appmngr.aif
C:\system\apps\Appmngr\Appmngr.app
C:\system\apps\BtUi\BtUi.app
C:\system\apps\BtUi\BtUi.aif
C:\system\apps\Camcorder\Camcorder.app
C:\system\apps\Camcorder\Camcorder.app
C:\system\apps\Camera\Camera.app
C:\system\apps\Camera\Camera.aif
C:\system\apps\efileman\efileman.app
C:\system\apps\efileman\efileman.aif
C:\system\apps\FExplorer\FExplorer.app
C:\system\apps\FExplorer\FExplorer.aif
C:\system\apps\File\File.app
C:\system\apps\File\File.aif
C:\system\apps\FileManager\FileManager.app
C:\system\apps\FileManager\FileManager.aif
C:\system\apps\ILoveU\ILoveU.APP
C:\system\apps\ILoveU\ILoveU.aif
C:\system\apps\ILoveU\ILoveU.RSC
C:\system\apps\ILoveU\ILU.mdl
C:\system\apps\IrApp\IrApp.app
C:\system\apps\IrApp\IrApp.aif
C:\system\apps\Logs\Logs.app
C:\system\apps\Logs\Logs.aif
C:\system\apps\mce\mce.app
C:\system\apps\mce\mce.aif
C:\system\apps\MediaGallery\MediaGallery.app
C:\system\apps\MediaGallery\MediaGallery.app
C:\system\apps\Menu\Menu.app
C:\system\apps\Menu\Menu.aif
C:\system\apps\Phone\Phone.app
C:\system\apps\Phone\Phone.aif
C:\system\apps\Phonebook\Phonebook.app
C:\system\apps\Phonebook\Phonebook.aif
C:\system\apps\SymCommander\SymCommander.app
C:\system\apps\SymCommander\SymCommander.aif
C:\system\apps\SystemExplorer\SystemExplorer.app
C:\system\apps\SystemExplorer\SystemExplorer.aif
C:\system\apps\ThNdRbRd.gif
C:\system\RECOGS\ILU.mdl
C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\Dont4get2readme.txt
C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ILoveU.APP
C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ILoveU.RSC
C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ILoveU.sis



Then, if i open that Dont4get2readme.txt and ThNdRbRd.gif is :

Code:
Saying HELLO From Here (SYRIA)
TO All The WORLD !!!

I Wish U N-Joy UR
Damaged Device ..

U Know, Not all may Read These Words But,
No Problem Bcuz Some will,

But even This, Thats The Way I Love U All ...

;-)


Regards,
ThNdRbRd
the picture is :



In Additional, i have extracted that C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ ILoveU.sis and there is a same extracted files with that malware Onehop.A except on folder C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ Just one file following it.
I think the creator just remixed these files from another malware, just recollect it. Then he repack it to one SIS files and included his own Signature

Skuller.A

This Trojan program infects mobile phones running Symbian. Any mobile running Symbian is potentially vulnerable.
The Trojan itself is an SIS file, usually called 'extendedtheme.sis', although it may have a different name. The file is 1,192,117 bytes in size.
The Trojan was distributed via a range of mobile phone forums. It was presented as a program with new icons, new wallpaper etc.
During installation, the Trojan creates the following information and application files:

Code:
?:\System\Apps\About\About.app
?:\System\Apps\About\About.aif
?:\System\Apps\AppInst\AppInst.app
?:\System\Apps\AppInst\AppInst.aif
?:\System\Apps\AppMngr\AppMngr.app
?:\System\Apps\AppMngr\AppMngr.aif
?:\System\Apps\Autolock\Autolock.app
?:\System\Apps\Autolock\Autolock.aif
?:\System\Apps\Browser\Browser.app
?:\System\Apps\Browser\Browser.aif
?:\System\Apps\BtUi\BtUi.app
?:\System\Apps\BtUi\BtUi.aif
?:\System\Apps\bva\bva.app
?:\System\Apps\bva\bva.aif
?:\System\Apps\Calcsoft\Calcsoft.app
?:\System\Apps\Calcsoft\Calcsoft.aif
?:\System\Apps\Calendar\Calendar.app
?:\System\Apps\Calendar\Calendar.aif
?:\System\Apps\Camcorder\Camcorder.app
?:\System\Apps\Camcorder\Camcorder.aif
?:\System\Apps\CbsUiApp\CbsUiApp.app
?:\System\Apps\CbsUiApp\CbsUiApp.aif
?:\System\Apps\CERTSAVER\CERTSAVER.app
?:\System\Apps\CERTSAVER\CERTSAVER.aif
?:\System\Apps\Chat\Chat.app
?:\System\Apps\Chat\Chat.aif
?:\System\Apps\ClockApp\ClockApp.app
?:\System\Apps\ClockApp\ClockApp.aif
?:\System\Apps\CodViewer\CodViewer.app
?:\System\Apps\CodViewer\CodViewer.aif
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.app
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.aif
?:\System\Apps\Converter\Converter.app
?:\System\Apps\Converter\Converter.aif
?:\System\Apps\cshelp\cshelp.app
?:\System\Apps\cshelp\cshelp.aif
?:\System\Apps\DdViewer\DdViewer.app
?:\System\Apps\DdViewer\DdViewer.aif
?:\System\Apps\Dictionary\Dictionary.app
?:\System\Apps\Dictionary\Dictionary.aif
?:\System\Apps\FileManager\FileManager.app
?:\System\Apps\FileManager\FileManager.aif
?:\System\Apps\GS\GS.app
?:\System\Apps\GS\GS.aif
?:\System\Apps\ImageViewer\ImageViewer.app
?:\System\Apps\ImageViewer\ImageViewer.aif
?:\System\Apps\location\location.app
?:\System\Apps\location\location.aif
?:\System\Apps\Logs\Logs.app
?:\System\Apps\Logs\Logs.aif
?:\System\Apps\mce\mce.app
?:\System\Apps\mce\mce.aif
?:\System\Apps\MediaGallery\MediaGallery.app
?:\System\Apps\MediaGallery\MediaGallery.aif
?:\System\Apps\MediaPlayer\MediaPlayer.app
?:\System\Apps\MediaPlayer\MediaPlayer.aif
?:\System\Apps\MediaSettings\MediaSettings.app
?:\System\Apps\MediaSettings\MediaSettings.aif
?:\System\Apps\Menu\Menu.app
?:\System\Apps\Menu\Menu.aif
?:\System\Apps\mmcapp\mmcapp.app
?:\System\Apps\mmcapp\mmcapp.aif
?:\System\Apps\MMM\MMM.app
?:\System\Apps\MMM\MMM.aif
?:\System\Apps\MmsEditor\MmsEditor.app
?:\System\Apps\MmsEditor\MmsEditor.aif
?:\System\Apps\MmsViewer\MmsViewer.app
?:\System\Apps\MmsViewer\MmsViewer.aif
?:\System\Apps\MsgMailEditor\MsgMailEditor.app
?:\System\Apps\MsgMailEditor\MsgMailEditor.aif
?:\System\Apps\MsgMailViewer\MsgMailViewer.app
?:\System\Apps\MsgMailViewer\MsgMailViewer.aif
?:\System\Apps\MusicPlayer\MusicPlayer.app
?:\System\Apps\MusicPlayer\MusicPlayer.aif
?:\System\Apps\Notepad\Notepad.app
?:\System\Apps\Notepad\Notepad.aif
?:\System\Apps\NpdViewer\NpdViewer.app
?:\System\Apps\NpdViewer\NpdViewer.aif
?:\System\Apps\NSmlDMSync\NSmlDMSync.app
?:\System\Apps\NSmlDMSync\NSmlDMSync.aif
?:\System\Apps\NSmlDSSync\NSmlDSSync.app
?:\System\Apps\NSmlDSSync\NSmlDSSync.aif
?:\System\Apps\Phone\Phone.app
?:\System\Apps\Phone\Phone.aif
?:\System\Apps\Phonebook\Phonebook.app
?:\System\Apps\Phonebook\Phonebook.aif
?:\System\Apps\Pinboard\Pinboard.app
?:\System\Apps\Pinboard\Pinboard.aif
?:\System\Apps\PRESENCE\PRESENCE.app
?:\System\Apps\PRESENCE\PRESENCE.aif
?:\System\Apps\ProfileApp\ProfileApp.app
?:\System\Apps\ProfileApp\ProfileApp.aif
?:\System\Apps\ProvisioningCx\ProvisioningCx.app
?:\System\Apps\ProvisioningCx\ProvisioningCx.aif
?:\System\Apps\PSLN\PSLN.app
?:\System\Apps\PSLN\PSLN.aif
?:\System\Apps\PushViewer\PushViewer.app
?:\System\Apps\PushViewer\PushViewer.aif
?:\System\Apps\Satui\Satui.app
?:\System\Apps\Satui\Satui.aif
?:\System\Apps\SchemeApp\SchemeApp.app
?:\System\Apps\SchemeApp\SchemeApp.aif
?:\System\Apps\ScreenSaver\ScreenSaver.app
?:\System\Apps\ScreenSaver\ScreenSaver.aif
?:\System\Apps\Sdn\Sdn.app
?:\System\Apps\Sdn\Sdn.aif
?:\System\Apps\SimDirectory\SimDirectory.app
?:\System\Apps\SimDirectory\SimDirectory.aif
?:\System\Apps\SmsEditor\SmsEditor.app
?:\System\Apps\SmsEditor\SmsEditor.aif
?:\System\Apps\SmsViewer\SmsViewer.app
?:\System\Apps\SmsViewer\SmsViewer.aif
?:\System\Apps\Speeddial\Speeddial.app
?:\System\Apps\Speeddial\Speeddial.aif
?:\System\Apps\Startup\Startup.app
?:\System\Apps\Startup\Startup.aif
?:\System\Apps\SysAp\SysAp.app
?:\System\Apps\SysAp\SysAp.aif
?:\System\Apps\ToDo\ToDo.app
?:\System\Apps\ToDo\ToDo.aif
?:\System\Apps\Ussd\Ussd.app
?:\System\Apps\Ussd\Ussd.aif
?:\System\Apps\VCommand\VCommand.app
?:\System\Apps\VCommand\VCommand.aif
?:\System\Apps\Vm\Vm.app
?:\System\Apps\Vm\Vm.aif
?:\System\Apps\Voicerecorder\Voicerecorder.app
?:\System\Apps\Voicerecorder\Voicerecorder.aif
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.app
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.aif
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.app
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.aif
______________________________________
?:\System\Libs\licencemanager20s.dll
?:\System\Libs\softwarecopier200.dll
?:\System\Libs\ZLIB.DLL
?:\System\Libs\notification.cmd
?:\System\Libs\lmpro.r01
?:\System\Libs\lmpro.r02



The application files created by the Trojan program are standard application files for the Symbian platform and do not contain any malicious code. The .aif files, however, are malicious; these create skull icons and block access to the application for which the skulls act as an icon.






All the
applications on the telephone will cease to function. Once a telephone has been infected it can only be used to make calls; SMS, MMS, camera, organiser functions etc. will no longer work.

Skuller.B
Code:
?:\System\Apps\About\About.app
?:\System\Apps\About\About.aif
?:\System\Apps\AppInst\AppInst.app
?:\System\Apps\AppInst\AppInst.aif
?:\System\Apps\AppMngr\AppMngr.app
?:\System\Apps\AppMngr\AppMngr.aif
?:\System\Apps\Autolock\Autolock.app
?:\System\Apps\Autolock\Autolock.aif
?:\System\Apps\Browser\Browser.app
?:\System\Apps\Browser\Browser.aif
?:\System\Apps\BtUi\BtUi.app
?:\System\Apps\BtUi\BtUi.aif
?:\System\Apps\bva\bva.app
?:\System\Apps\bva\bva.aif
?:\System\Apps\Calcsoft\Calcsoft.app
?:\System\Apps\Calcsoft\Calcsoft.aif
?:\System\Apps\Calendar\Calendar.app
?:\System\Apps\Calendar\Calendar.aif
?:\System\Apps\Camcorder\Camcorder.app
?:\System\Apps\Camcorder\Camcorder.aif
?:\System\Apps\CbsUiApp\CbsUiApp.app
?:\System\Apps\CbsUiApp\CbsUiApp.aif
?:\System\Apps\CERTSAVER\CERTSAVER.app
?:\System\Apps\CERTSAVER\CERTSAVER.aif
?:\System\Apps\Chat\Chat.app
?:\System\Apps\Chat\Chat.aif
?:\System\Apps\ClockApp\ClockApp.app
?:\System\Apps\ClockApp\ClockApp.aif
?:\System\Apps\CodViewer\CodViewer.app
?:\System\Apps\CodViewer\CodViewer.aif
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.app
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.aif
?:\System\Apps\Converter\Converter.app
?:\System\Apps\Converter\Converter.aif
?:\System\Apps\cshelp\cshelp.app
?:\System\Apps\cshelp\cshelp.aif
?:\System\Apps\DdViewer\DdViewer.app
?:\System\Apps\DdViewer\DdViewer.aif
?:\System\Apps\Dictionary\Dictionary.app
?:\System\Apps\Dictionary\Dictionary.aif
?:\System\Apps\FileManager\FileManager.app
?:\System\Apps\FileManager\FileManager.aif
?:\System\Apps\GS\GS.app
?:\System\Apps\GS\GS.aif
?:\System\Apps\ImageViewer\ImageViewer.app
?:\System\Apps\ImageViewer\ImageViewer.aif
?:\System\Apps\location\location.app
?:\System\Apps\location\location.aif
?:\System\Apps\Logs\Logs.app
?:\System\Apps\Logs\Logs.aif
?:\System\Apps\mce\mce.app
?:\System\Apps\mce\mce.aif
?:\System\Apps\MediaGallery\MediaGallery.app
?:\System\Apps\MediaGallery\MediaGallery.aif
?:\System\Apps\MediaPlayer\MediaPlayer.app
?:\System\Apps\MediaPlayer\MediaPlayer.aif
?:\System\Apps\MediaSettings\MediaSettings.app
?:\System\Apps\MediaSettings\MediaSettings.aif
?:\System\Apps\Menu\Menu.app
?:\System\Apps\Menu\Menu.aif
?:\System\Apps\mmcapp\mmcapp.app
?:\System\Apps\mmcapp\mmcapp.aif
?:\System\Apps\MMM\MMM.app
?:\System\Apps\MMM\MMM.aif
?:\System\Apps\MmsEditor\MmsEditor.app
?:\System\Apps\MmsEditor\MmsEditor.aif
?:\System\Apps\MmsViewer\MmsViewer.app
?:\System\Apps\MmsViewer\MmsViewer.aif
?:\System\Apps\MsgMailEditor\MsgMailEditor.app
?:\System\Apps\MsgMailEditor\MsgMailEditor.aif
?:\System\Apps\MsgMailViewer\MsgMailViewer.app
?:\System\Apps\MsgMailViewer\MsgMailViewer.aif
?:\System\Apps\MusicPlayer\MusicPlayer.app
?:\System\Apps\MusicPlayer\MusicPlayer.aif
?:\System\Apps\Notepad\Notepad.app
?:\System\Apps\Notepad\Notepad.aif
?:\System\Apps\NpdViewer\NpdViewer.app
?:\System\Apps\NpdViewer\NpdViewer.aif
?:\System\Apps\NSmlDMSync\NSmlDMSync.app
?:\System\Apps\NSmlDMSync\NSmlDMSync.aif
?:\System\Apps\NSmlDSSync\NSmlDSSync.app
?:\System\Apps\NSmlDSSync\NSmlDSSync.aif
?:\System\Apps\Phone\Phone.app
?:\System\Apps\Phone\Phone.aif
?:\System\Apps\Phonebook\Phonebook.app
?:\System\Apps\Phonebook\Phonebook.aif
?:\System\Apps\Pinboard\Pinboard.app
?:\System\Apps\Pinboard\Pinboard.aif
?:\System\Apps\PRESENCE\PRESENCE.app
?:\System\Apps\PRESENCE\PRESENCE.aif
?:\System\Apps\ProfileApp\ProfileApp.app
?:\System\Apps\ProfileApp\ProfileApp.aif
?:\System\Apps\ProvisioningCx\ProvisioningCx.app
?:\System\Apps\ProvisioningCx\ProvisioningCx.aif
?:\System\Apps\PSLN\PSLN.app
?:\System\Apps\PSLN\PSLN.aif
?:\System\Apps\PushViewer\PushViewer.app
?:\System\Apps\PushViewer\PushViewer.aif
?:\System\Apps\Satui\Satui.app
?:\System\Apps\Satui\Satui.aif
?:\System\Apps\SchemeApp\SchemeApp.app
?:\System\Apps\SchemeApp\SchemeApp.aif
?:\System\Apps\ScreenSaver\ScreenSaver.app
?:\System\Apps\ScreenSaver\ScreenSaver.aif
?:\System\Apps\Sdn\Sdn.app
?:\System\Apps\Sdn\Sdn.aif
?:\System\Apps\SimDirectory\SimDirectory.app
?:\System\Apps\SimDirectory\SimDirectory.aif
?:\System\Apps\SmsEditor\SmsEditor.app
?:\System\Apps\SmsEditor\SmsEditor.aif
?:\System\Apps\SmsViewer\SmsViewer.app
?:\System\Apps\SmsViewer\SmsViewer.aif
?:\System\Apps\Speeddial\Speeddial.app
?:\System\Apps\Speeddial\Speeddial.aif
?:\System\Apps\Startup\Startup.app
?:\System\Apps\Startup\Startup.aif
?:\System\Apps\SysAp\SysAp.app
?:\System\Apps\SysAp\SysAp.aif
?:\System\Apps\ToDo\ToDo.app
?:\System\Apps\ToDo\ToDo.aif
?:\System\Apps\Ussd\Ussd.app
?:\System\Apps\Ussd\Ussd.aif
?:\System\Apps\VCommand\VCommand.app
?:\System\Apps\VCommand\VCommand.aif
?:\System\Apps\Vm\Vm.app
?:\System\Apps\Vm\Vm.aif
?:\System\Apps\Voicerecorder\Voicerecorder.app
?:\System\Apps\Voicerecorder\Voicerecorder.aif
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.app
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.aif
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.app
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.aif
__________________________________________
?:\System\CARIBESECURITYMANAGER\caribe.app
?:\System\CARIBESECURITYMANAGER\caribe.rsc
?:\System\CARIBESECURITYMANAGER\CAMTIMER.sis
__________________________________________
?:\System\RECOGS\flo.mdl
This skuller is same as Skuller.A but some differents on System\Libs and System\CARIBESECURITYMANAGER, then this virus also include flo.mdl on System\Recogs.


Skuller.D
Code:
?:\System\Apps\Appctrl\Appctrl.app
?:\System\Apps\Appctrl\Appctrl.aif
?:\System\Apps\BtUi\BtUi.app
?:\System\Apps\BtUi\BtUi.aif
?:\System\Apps\efileman\efileman.app
?:\System\Apps\efileman\efileman.aif
?:\System\Apps\FExplorer\FExplorer.app
?:\System\Apps\FExplorer\FExplorer.aif
?:\System\Apps\File\File.app
?:\System\Apps\File\File.aif
?:\System\Apps\FileManager\FileManager.app
?:\System\Apps\FileManager\FileManager.aif
?:\System\Apps\FileView\FileView.app
?:\System\Apps\FileView\FileView.aif
?:\System\Apps\Mariya\Mariya.app
?:\System\Apps\Mariya\Mariya.mdl
?:\System\Apps\Mariya\Mariya.rsc
?:\System\Apps\MediaGallery\MediaGallery.app
?:\System\Apps\MediaGallery\MediaGallery.aif
?:\System\Apps\mmcapp\mmcapp.app
?:\System\Apps\mmcapp\mmcapp.aif
?:\System\Apps\Phone\Phone.app
?:\System\Apps\Phone\Phone.aif
?:\System\Apps\Phonebook\Phonebook.app
?:\System\Apps\Phonebook\Phonebook.aif
?:\System\Apps\ProfileApp\ProfileApp.app
?:\System\Apps\ProfileApp\ProfileApp.aif
?:\System\Apps\SmartFileMan\SmartFileMan.app
?:\System\Apps\SmartFileMan\SmartFileMan.aif
?:\System\Apps\Startup\Startup.app
?:\System\Apps\Startup\Startup.aif
?:\System\Apps\SystemExplorer\SystemExplorer.app
?:\System\Apps\SystemExplorer\SystemExplorer.aif
?:\System\Apps\ThNdRbRd\ThNdRbRd.app
?:\System\Apps\ThNdRbRd\ThNdRbRd.aif
?:\System\Apps\Voicerecorder\Voicerecorder.app
?:\System\Apps\Voicerecorder\Voicerecorder.aif
____________________________________
?:\System\data\Backgroundimage.mbm
____________________________________
?:\System\Nawrasxsecuredata\NawraSSECURITYMANAGER\Mariya.app
?:\System\Nawrasxsecuredata\NawraSSECURITYMANAGER\Mariya.rsc
?:\System\Nawrasxsecuredata\NawraSSECURITYMANAGER\Mariya.sis
____________________________________
?:\System\Recogs\Naw.mdl
Effect is same as both, but this one also show us the Background display on main screen with this file C:\System\data\Backgroundimage.mbm.
if we shot on Menu, just like this :




full file download Mobile Virus Analyze.doc

http://ajitkathat.110mb.com/Virus%20Mobile%20Analyze.doc