Monday, February 21, 2011

Solution of privious post (windows xp logouts immediatly after login)through Remote ragistry

Edit these values and type the correct path of shell :

Shell = explorer.exe
Userinit=X:\windows\system32\userinit.exe

NOTE: These files may also be deleted by spywares. You may need to extract them using Windows CD.

Steps for rectifying this problem:


Log on to a networked computer.
Run Regedit.exe
Point your cursor to HKEY_LOCAL_MACHINE
Select File > Connect Remote Registry
Type computer name (infected computer)
Navigate to the following location in registry of destination or infected computer


HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon


Edit these two values in right pane:

Shell
Userinit


Change these two values to
Shell=explorer.exe
Userinit = x:\windows\system32\userinit.exe
Exit from Registry
Restart Infected computer.
You should be able to log on to computer.
if it not work then go to back steps and just copy orwrite the file userinit.exe

worked successfully tested 100 percent guaranteed

Windows XP logout automatically

THIS SOLUTION WORKS 100%

Let me explain what happen with ur computer (why u cant login into ur windows account).

1) u got a virus
2) it copied itslef, or it made a copy simmilar name to itself into ur WINDOWS/system32
3) it cahnged the registry key: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT \ CurrentVersion \ Winlogon, and instead "Userinit.exe", it wrote its name

So, heres an example:

1) u got a virus, for an example, "winupdate86.exe"
2) it made a copy inside system32 as "winlogon86.exe"
3) changed registry key, and in entry putted "winlogon86.exe"

So, ur computer actualy loged on via virus, all time until ur antivirus deleted it (after that u couldnt be able to login). After ur antivurs detected and removed the virus( both "winupdate86.exe" and "winlogon86.exe") ur windows continues to look for "winlogon86.exe", couse it is on current place in registry,and its all it knowsto look for, when it try to login.

So, to solve the problem u need to (SOLUTION!!!)

1) only way to recover ur login is to find a copy of "userinit.exe" file (from XP DVD, from another computer...)
2) rename it to be as name of virus u had (u maybe dont know it, couse ur antivirus deleted it, but if u know u llbe able to fix ur login). So, sopy of "userinit.exe" rename to "winlogon86.exe"
3) put new renamed copy into ur system32 (Ofc, u dont have windows on ur computer, couse u cant login, but ucan plug off hard disk and plugin it to another computer. Other solution is if u can make bottable USB or Floppy disk DOS, and use simple copy function. 3th solution is if u have another operative system on ur computer, and manage coping there)
4) login ur windows normaly (now after u tricked ur regystry key, it still looks for same entry when it login, which was name of virus. But trick is u made a copy of real userinit.exe, and renamed to trick registry)
5) find via regedit HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT \ , and instead name of virus, put "userinit.exe"

Thats all, ofc if u still have virus would be great if u write its name before ur Antivirus delete.. If u still know it, just do steps. If u dont know actual name of virus u can do steps, but not gonna help u. Couse u need to know whats written in entry HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ WindowsNT \ . I found alctual name of my antivirus in way I go to search files inside my WINDOWS folder. And after it finished, I sorted all files with Modified Date, and Created Date... I found all files of virus in my system32... Deleted them and I had this problem... but after I saw all u people worte here I knew how to fix. Ofc I was lucky cuz I before deleting them, made a carantine. So I knew names. And with another comuter fixed.

Wednesday, June 9, 2010

What is svchost.exe? Is svchost.exe spyware or a virus?

Process name: Host Process for Services
Product: Windows
Company: Microsoft
File: svchost.exe


"Svchost.exe" (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be stopped or restarted manually. This process manages system services that run from dynamic link libraries (files with extension .dll). Examples for such system services are: "Automatic Updates", "Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more.
At startup, Svchost.exe checks the services portion of the registry and constructs a list of services that it needs to load. Under normal conditions, multiple instances of Svchost.exe will be running simultaneously. Each Svchost.exe session can contain a grouping of services, so that many services can be run depending on how and where Svchost.exe is started. This allows for better control and debugging.
If the process svchost.exe uses high cpu resources, it is mostly due because the service "Automatic Updates" is downloading some new Windows update. But having a 99% or 100% cpu usage could be caused by downloads due of some hidden malware on your computer. Some malware like the Conficker worm changes the Windows Registry so that svchost loads the malware .dll file. In this case you only see the authentic svchost.exe process in the task manager!
See also: Microsoft reference

Note: The svchost.exe file is located in the folder C:\Windows\System32. In other cases, svchost.exe is a virus, spyware, trojan or worm! Check this with Security Task Manager.

Virus with same name:
Symantec Security Response - W32.Welchia.Worm
Symantec Security Response - W32.Assarm@mm
McAfee - W32/Jeefo
Microsoft Conficker worm

Common Known Win32 Worms

Win32:Badtrans [Wrm]
Win32:Beagle [Wrm] (aka Bagle), variants A-Z, AA-AH
Win32:Blaster [Wrm] (aka Lovsan), variants A-I
Win32:BugBear [Wrm], including B-I variants
Win32:Ganda [Wrm]
Win32:Klez [Wrm], all variants (including variants of Win32:Elkern)
Win32:MiMail [Wrm], variants A, C, E, I-N, Q, S-V
Win32:Mydoom [Wrm] (variants A, B, D, F-N - including the trojan horse)
Win32:Nachi [Wrm] (aka Welchia, variants A-L)
Win32:NetSky [Wrm] (aka Moodown, variants A-Z, AA-AD)
Win32:Nimda [Wrm]
Win32:Opas [Wrm] (aka Opasoft, Opaserv)
Win32:Parite (aka Pinfi), variants A-C
Win32:Sasser [Wrm] (variants A-G)
Win32:Scold [Wrm]
Win32:Sinowal [Trj] - variants AA, AB
Win32:Sircam [Wrm]
Win32:Sober [Wrm], variants A-I, J-K
Win32:Sobig [Wrm], including variants B-F
Win32:Swen [Wrm], including UPX-packed variants
Win32:Tenga
Win32:Yaha [Wrm] (aka Lentin), all variants
Win32:Zafi [Wrm] (variants A-D)

* Backdoors
* General Trojans
* PSW Trojans
* Trojan Clickers
* Trojan Downloaders
* Trojan Droppers
* Trojan Proxies
* Trojan Spies
* Trojan Notifiers
* ArcBombs
* Rootkits

Virus Naming Conventions


When searching for a virus name, you should be aware of the naming conventions used by Symantec/Norton AntiVirus. Virus names consist of a Prefix, a Name, and often a Suffix.
  • The Prefix denotes the platform on which the virus replicates or the type of virus. A DOS virus usually does not contain a Prefix.
  • The Name is the family name of the virus.
  • The Suffix may not always exist. Suffixes distinguish among variants of the same family and are usually numbers denoting the size of the virus or letters.
PREFIXES
A2KM Access macro viruses that are native to Access 2000.
A97M Access macro viruses that are native to Access 97.
AM Access macro viruses that are native to Access 95
AOL Trojan horses that are specific to America Online environments and usually steal AOL password information
BAT Batch file threats.
Backdoor Threats may allow unauthorized users to access your computer across the Internet.
Bloodhound Bloodhound is the name of the Norton AntiVirus heuristic scanning technology for detecting new and unknown viruses
DDos Distributed Denial of Service threats. Distributed Denial of Service involves using zombie computers in an attempt to flood an Internet site with traffic.
DoS Denial of Service threats. Not to be confused with DOS viruses, which are named without prefixes.
HLLC High Level Language Companion viruses. These are usually DOS viruses that create an additional file (the companion) to spread.
HLLO High Level Language Overwriting viruses. These are usually DOS viruses that overwrite host files with viral code.
HLLP High Level Language Parasitic viruses. These are usually DOS viruses that attach themselves to host files.
HLLW A worm that is compiled using a High Level Language. (NOTE: This modifier is not always a prefix, it is only a prefix in the case of a DOS High Level Language Worm. If the Worm is a Win32 file, the proper name would be W32.HLLW.)
HTML Threats that target HTML files.
IRC Threats that target IRC applications.
JS Threats that are written using the JavaScript programming language.
Java Viruses that are written using the Java programming language.
Linux Threats that target the Linux operating system.
O2KM Office 2000 macro viruses. May infect across different types of Office 2000 documents.
O97M Office 97 macro viruses. May infect across different types of Office 97 documents.
OM Office macro viruses. May infect across different types of Office documents.
PWSTEAL Trojan horses that steal passwords.
Palm Threats that are designed to run specifically on the Palm OS.
Trojan/Troj These files are not viruses, but Trojan horses. Trojan horses are files that masquerade as helpful programs, but are actually malicious code. Trojan horses do not replicate.
UNIX Threats that run under any UNIX-based operating system.
VBS Viruses that are written using the Visual Basic Script programming language.
W2KM Word 2000 macro viruses. These are native to Word 2000 and replicate under Word 2000 only.
W32 32-bit Windows viruses that can infect under all 32-bit Windows platforms.
W95 Windows 95 viruses that infect files under the Windows 95 operating system. Windows 95 viruses often work in Windows 98 also.
W97M Word 97 macro viruses. These are native to Word 97 and replicate under Word 97 only.
W98 Windows 98 threats that infect files under the Windows 98 operating system. Will only work in Windows 98.
WM Word macro viruses that replicate under Word 6.0 and Word 95 (Word 7.0). They may also replicate under Word 97 (Word 8.0), but are not native to Word 97.
WNT 32-bit Windows viruses that can infect under the Windows NT operating system.
Win Windows 3.x viruses that infect files under the Windows 3.x operating system.
X2KM Excel macro viruses that are native to Excel 2000.
X97M Excel macro viruses that are native to Excel 97. These viruses may replicate under Excel 5.0 and Excel 95 as well.
XF Excel formula viruses are viruses using old Excel 4.0 embedded sheets within newer Excel documents.
XM Excel macro viruses that are native to Excel 5.0 and Excel 95. These viruses may replicate in Excel 97 as well.

SUFFIXES
@m Signifies the virus or worm is a mailer. An example is Happy99 (W32.Ska), which only sends itself by email when you (the user) send mail.
@mm Signifies the virus or worm is a mass-mailer. An example is Melissa, which sends messages to every email address in your mailbox.
dam Indicates a detection for files that have been corrupted by a threat, or that may contain inactive remnants of a threat, causing the files to no longer be able to execute properly or produce reliable results.
dr Indicates that the detected file is a dropper for another threat.
Family Indicates a generic detection for threats that belong to a particular threat family based on viral characteristics.
Gen Indicates a generic detection for threats that belong to a particular threat type based on viral characteristics.
Int Indicates an intended threat. Threats that are intended to spread, but don't due to bugs or errors in the viral code.
Worm Indicates a worm, not a virus. Worms make copies of themselves that they send across a network or using email, or another transport mechanism

Win32 Virus - How to Remove Win32 Virus Trojan Proxy

How to Remove Win32 Virus - Trojan Proxy

The Trojan-Proxy.Win32 virus is a worm affecting computers running Microsoft Windows.

These Trojans function as a proxy server and provide anonymous access to the Internet from victim machines.

Today these Trojans are very popular with spammers who always need additional machines for mass mailings.

Virus coders will often include Trojan-proxies in Trojan packs and sell networks of infected machines to spammers.

You may not even know your computer has been infected. Hundreds of computers get infected daily. Simply visiting certain malicious sites can cause your computer to be infected. To find out you can try using a antivirus scanner and virus removal software.

Trojans are breaching your computer security and should be removed. The Trojan-Proxy.Win32 Trojan can be removed from your system if it has been infected!



What Exactly is the Win32 Trojan Proxy Virus

This Trojan program makes it possible for a remote malicious user to use the machine as a proxy-server.

A proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. So in simple terms, the Trojan-Proxy virus uses your computer as a host to sell to spammers. Ever wondered where all your internet bandwidth has gone?

The Trojan itself is a Windows PE EXE file written in Visual C++, packed using UPX. The file can be between 39KB - 53KB in size.

An example of a Trojan horse virus would be that a program you may have downloaded which you think is something simple like a screensaver program named "exotic-cars.scr" which seems to be a car desktop screensaver. When you install it, it instead unloads hidden programs, commands, scripts, or any number of commands with or without you knowing it is doing it in the background.

Trojan Horse programs can often be used to bypass security protection you have on your system which causes you system to be left without any protect and gives the hacker full access to your machine.


What Does the Trojan-Proxy.Win32 Virus Do?

The Trojan creates a unique identifier, "Windows-Update-Service" to flag its presence in the system.

Once launched, the Trojan listens on a random TCP port to realize the proxy-server function. The number of the port chosen is randomly generated, and will be in the range 1025 - 5024. If it is not possible to listen on this port, a new attempt will be made, with the port number being regenerated.

The worm then establishes a connection to cb.im***itethinking.biz. If this is unsucessful, the attempt will be repeated at 15 minute intervals.

If the connection is successful, the number of the port which the Trojan is listening on will be encoded and transmitted to port 3878 on the server in encrypted form.

Once the remote malicious user receives this data, s/he will be able to use the victim machine as a proxy-server.

Manually Remove the Trojan-Proxy.Win32 Virus and Removing it from the Registry

Removing a virus using the manual method.

Removing a virus can be done manually, however you will need to understand how to edit the system registry and be able to troubleshoot various problems with your computer system. Viruses are persistent and removing one can take a considerable amount of time and knowledge of how an operating system works. You will also need to know how to edit registry to delete virus and stop it from reinstalling each time you connect to the internet.

Removal Instructions

1. Determine the name of the Trojan program by using regedit or another utility to edit the system registry. View the "Services" parameter in the [HKLM\Software\Microsoft\Windows\CurrentVersion\Run] key; this parameter gives the full path to the malicious program.

2. Use Task Manager to terminate the process with the Trojan name.

3. Delete the original Trojan file.

4. Delete the following value from the system registry key:
[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]"Services"=""



Still Having Problems Manually Removing the Win32 Virus

If you couldn't remove it for some reason try using anti-virus software

Win32 worms generally are set to run automatically when you start your computer or even register themselves to be run when any other application is started. Unfortunately, you can't just delete the worm file or your computer system might not be able to start your applications (such as Explorer) any more.

In order to effectively remove the worm from your computer system, it is often necessary to make additional changes to your system registry. Editing the system registry isn't easy. It can be done but can be difficult for those who aren't computer technicians.


Win32 Virus Resources and Further Information

Symantec Virus Name Definitions
There are many different types of viruses. This is a great resource to tell you what different prefixes in virus names mean and how they differ.

Tuesday, July 28, 2009

List of Symbian OS mobile viruses

List Of Mobile Virus

Source Codes:

BlueJackX Source Code
Caribe.A.source code.zip
Caribe.AA-Spooky.zip
Caribe.AC-Spooky.zip
CommWarrior C Source Code
MOSQIT-A.IDE
velasco cellphone virus source code.zip
velasco cellphone worm source code.zip

Symbian Viruses:
3gexplorer.sis
Appdisabler.A!-BT TeRoR v0.10.sis
Appdisabler.B!-Raghu.sis
Appdisabler.D!-Raghu.sis
Appdisabler.Gen!-Bluetooth Speed v2.0 - BiNPDA.sis
Appdisabler.Gen!-BLUETOOTH.SPEED.sis
Appdisabler.Gen!-Browser_NGAGEQD.sis
Appdisabler.Gen!-FreeCrypt.sis
Appdisabler.Gen!-Lucifa.sis
Appdisabler.Gen!-Mobi Cleaner 2008.sis
Appdisabler.Gen!-Modified Virus.sis
Appdisabler.Gen!-New! !_Startup windowXP NOKIA.sis
Appdisabler.Gen!-Nokia Sensor.sis
Appdisabler.Gen!-Rebooter.sis
Appdisabler.H!-Raghu.sis
Appdisabler.S!-MyDoom.sis
Beselo.A!-Beauty.jpg
Beselo.A!-Love.rm
BlankFont.A!-Rally 2.sis
BlankFont.B!-Rally 3.sis
BlankFont.C!-Rally 3.sis
BlueJackX.sis
Bluetooth_terror v1.50.sis
Bootton.A!-ILoveU.sis
Bootton.D!-Worms Armageddon by DFT.sis
Bootton.F!-Rebooter by WarriorMarrior.sis
Bootton.G!-PHalls_v1.00.sis
BTex.sis
Cabir.A!-Caribe.sis
Cabir.AA!-INBOX.sis
Cabir.AC!-INBOX.sis
Cabir.AF!-Pinball.sis
Cabir.B!-Caribe.sis
Cabir.B,1!-3d_OIDI500.sis
Cabir.C!-Ni&Ai-.sis
Cabir.D!-Mytiti.sis
Cabir.E!-[YUAN].sis
Cabir.F!-Skulls.sis
Cabir.G!-Tee222.sis
Cabir.I!-BtChatX 2007.sis
Cabir.I!-H5N1.sis
Cabir.I!-Velasco.sis
Cabir.I!-West-Nil.sis
Cabir.J!-IHateU.sis
Cabir.K!-Marcos (Worm).sis
Cabir.K!-Velasco (Worm).sis
Cabir.M!-Free$8.sis
Cabir.N!-SEXY-.sis
Cabir.O!-Mobile.sis
Cabir.P!-22207-.sis
Cabir.Q!-Crazy!.sis
Cabir.R!-Fuyuan.sis
Cabir.R!-Nawras.sis
Cabir.S!-Guan4u.sis
Cabir.T!-ILoveU.sis
Cabir.U_Sexxxy.sis
Cabir.V!-Mariya.sis
Cabir.X!-symTEE.sis
Cabir.Y!-SmartMovie2.52full.sis
Cabir.Y!-yuanV2.sis
Cadomesk.A!-F-Cabir.sis
Cadomesk.B!-Brgbg.sis
Cadomesk.C!-CabirFix.sis
Cardblock.A!-InstantSis.sis
Cardtrp.A!-Black_Symbian v0.10.sis
Cardtrp.A!-FATIconz.sis
Cardtrp.AB!-Anti Virus from F-Secure.sis
Cardtrp.AD!-Opera PATCH FULL ++.sis
Cardtrp.AF!-BlueSoft Hacking Pro.sis
Cardtrp.B!-CamcorderPro v3.00 final.sis
Cardtrp.P!-Half Life 2 - Gameloft .sis
Cardtrp.Q!-KingKong Game - CRACKED .sis
Cardtrp.R!-RealPlayer v01.00.sis
Cardtrp.T!-BattleField 2 - GAMELOFT.sis
Cardtrp.X!-Image Manager - BiNPDa.sis
Cdropper.B!-Sexxxy Pictures of Me.sis
Cdropper.H!-CAMTIMER.sis
Cdropper.M!-Caribe.sis
Cdropper.N!-EzBoot.sis
Cdropper.O!-Pinball S60.sis
Commdropper.A!-Update TomTom Mobile 5.40.sis
Commdropper.D!-GprsSettings.sis
Commdropper.E!-Mp3 UltraDJ.sis
Commdropper.G!-Norton_Symbian Full.sis
Commdropper.H!-Mobiluck 5.73 Cracked.sis
Commwarrior.A!-Naruto_shipudden_By_team_BeNPDA.sis
Commwarrior.A!.sis
Commwarrior.B!-Casper.sis
Commwarrior.B!.sis
Commwarrior.C!-CoMmWArrIoR.sis
Commwarrior.C!-CWOutcast.sis
Commwarrior.C!.zip
Commwarrior.D!-HackTool!!!.sis
Commwarrior.E!-Amena_Info.sis
Commwarrior.G!-Chatt Yahoo.sis
Commwarrior.H!-Mp3 UltraDJ.sis
Commwarrior.I!-LeslieLoves.jpg
Commwarrior.I!-Sudoku Play.sis
Commwarrior.J!-F-Explorer 1.6.sis
Commwarrior.M!-NortonPro..sis
Commwarrior.Q!-Coolantivirus.sis
Commwarrior.Q!-FExplorer.v1.17.Cracked.sis
Commwarrior.Q!-Final Team v 2.11.sis
Commwarrior.Q!-Smart hardware calculator.sis
Commwarrior.Q!-Static Sex Game v3.99.sis
Commwarrior.Q!.zip
Cw.sis
Dampig.A!-FScaller3.2Crack7610.sis
Dampig.A,1!-FaceWave5.20-7610-6600.sis
Disable images load in standard browse s60v2.sis
Doomboot.A!-Doom 2 cracked DFT v1.0.sis
Doomboot.B!-Restart.sis
Appdisabler.Gen!-Modified Virus.sis
Doomboot.G!-exoVirusStop v2.13.16.sis
Doomboot.I!-exoVirusStop v2.13.19.sis
Doomboot.J!-AppManager 1.0.sis
Doomboot.M!-Leslie Loves.sis
Drever.A!-lmpro.sis
Drever.B!-Anitivirus 1.17.sis
Drever.B!-Anti-Virus 1.02.sis
Drever.B!-Anti-Virus 1.22.sis
Drever.B!-AntiVirus 1.1.8 DotSIS.sis
Drever.B!-SimworkAnitivirus 1.15.sis
Drever.B!.mdl
Drever.C!-New_bases_and_crack_for_antiviruses.sis
Drever.D!-Drever.sis
Fontal.A!-Font_remover.sis
Fontal.A!-Fontremover.sis
Fontal.A!-Kill Saddam By OID500.sis
Fontal.H!-T-VIRUS.sis
Fontal.I!-Nokia Anti-Virus.sis
Fontal.I!-San_fonts.sis
For Nokia 6600.sis
Formatting-phone-s60.sis
Guardian
Guardian v.200.sis
Harrisii.sis
Hidmenu.A!-Apple_icons s60.sis
Hidmenu.A!-Freak SysIcons.sis
Hidmenu.A!-Hide_menu 1.0.sis
Hidmenu.A!-XP_Candy_[kev_kev].sis
Hidmenu.A!-XpTheme.sis
Hidmenu.A,1!-Szilvia's Dream 1.4.sis
Hobbes.A!-Symantec Anti-Virus.sis
Jimm.jar
Killphone.B!-Nice Phone Starter v0.1 Beta.sis
Killphone.B!-Phone-Startup-Like-Pc.sis_unpack.sis
Killphone.B!-Phone-Startup-Like-Pcvirus.sis_unpack.sis
iSexPlayer.jar
Lasco.A!-Marcos (Virus).sis
Lasco.A!-Velasco (Virus).sis
Lasco.A!-Velasco.sis
LCG Jukebox (Sms Lite).sis
LCRemover!-Unlock Security.sis
Locknut.B!-mmfaddon.sis
Locknut.C!-Patch.sis
Locknut.D!-Patch.sis
Mabir.A!-Caribe.sis
Mabir.A!-Info.sis
Mabir.C!-Gollum ScreenSaver.sis
Mabtal.A!-[Profimail v2.75_FULL].sis
MagicBlueHack.jar
MediaPlay
Mp3 Editor
Mobile Security.sis
Mrex.A!-MreX Beta.sis
Need For Speed UnderGround 3D.sis
Need_For_Speed_Underground2_ By_V-Cast_Repacked_For_Nokia_Symbian(only 6630,6680,6600,n-gage,n-gageQD).sis
NeedforSpeed.sis
New Font.sis
Opera_Booster.sis
OPLProcedureUtilities.sis
Ozicom 7650 Hebrew v1.03.sis
Ozicom Nokia 7650 Hebrew Support.sis
Pbstealer.C!-PBCompressor.sis
Pbstealer.D!-PBCompressor.sis
Pbstealer.E!-MyProfile.sis
Pe_Dropper.Gen!-PrinceOfPersia 3D.sis
Phayam.A!-AutoExec.sis
Phayam.A,1!-BlackList.sis
Phayam.A,2!-PhotoRite SP.sis
Phayam.A,3!-PowerLock.sis
Phayam.B!-explore.v1.22.s60.sis
Redbrowser.A!-RedBrowser.jar
Redbrowser.B!-CheapSMS.V2.1.jar
RommWar.A!-Stoper by WarriorMarrior.sis
RommWar.B!-FuckyouMarrior.sis
RommWar.D!-KAV Mobile V 1_8.sis
Romride.D!-Anti-Virus.sis
Sendtool.A!-FSpreader.sis
Silenthill3D.v1.2.sis
Singlejump.A!-F-Secure_Antivirus.sis
Singlejump.B!-MetalG.sis
Singlejump.C!-MetalG.sis
Singlejump.D!-SplinterCell-ChaosTheory_ngage_cracked-XiMPDA.sis
Singlejump.E!-SplinterCell-ChaosTheory_ngage_cracked-XiMPDA.sis
Singlejump.G!-Carmageddon 3D.sis
SIS_Recursion.Gen!-apple_8LKDyYF8.sis
SIS_Recursion.Gen!-Doraemon23_dHUEBtml.sis
SIS_Recursion.Gen!-www,OwnSkin,com Theme.sis
Skudoo!-BounceMP3.sis
Skuller.Gen!-Menu Speeder.sis
Skuller.Gen!-Opera8.65_2009mod.sis_unpack.sis
Skulls!-FuckBT.sis
Skulls.019!-PHalls_Beta.sis
Skulls.025!-BlueNumStealer!.sis
Skulls.A!-Extended Theme.sis
Skulls.AB!-TyTrone Programs v2.2.0 by sharp_the_legend.sis
Skulls.AD!-FreeCall_1.01-XiMpda.sis
Skulls.B!-Icons.sis
Skulls.B!-PaletteExtender.sis
Skulls.BX!-F-Secure_S60-Anti-Virus.sis
Skulls.BZ!-X-Ray Full byDotSis.sis
Skulls.C!-MyDoom.sis
Skulls.C!-PILEK.sis
Skulls.C!-T2 RS3AS.sis
Skulls.CB!-Mobiluck.sis
Skulls.CG!-SkullsRevised.sis
Skulls.CI!-Phalls v0.5.sis
Skulls.D!-beta_092_free-sms-RM8.sis
Skulls.D!-Macromedia_Flash_1.1_Full_3650_Ngage_Dotsis.sis
Skulls.D!-Yew Sprite 1.0 Dotsis.sis
Skulls.E!-Mariya.sis
Skulls.F!-ThNdRbRd.sis
Skulls.G!-Simworks.sis
Skulls.Gen!-Fixx_SymbianWare.sis
Skulls.H!-SysIconz v1.01.sis
Skulls.N!-Naruto_Screesaver.sis
Skulls.N!-Recap.sis
Skulls.N!-respineda_virus_2008.sis
Skulls.N!-shinchan scrensaver.sis
Skulls.sis
SMS.J2ME.Swapi.Q!-Artillery.jar
Sms.Python.Flocker.A!-Mp3TegEditor.sis
SmsAnywhereLite.A!-Sms Lite 1.10.sis
SpeakDoom!-F-Secure 2.30 cracked symcracKV.sis
Speedup.sis
Spyware.FlexiSpy!-Phones.sis
Stealwar.C!-StealWarrior.sis
System_Files.Gen!-About-1.04 -mEnPDA-.sis
System_Files.Gen!-doomboot2.sis
System_Files.Gen!-FB_Enhancer.sis
System_Files.Gen!-Notepad - BiNPDA.sis
Trojan.Mos!-Mosquitos by Soddom.sis
TSG Phone Safe.sis
VirusScanMobile.sis
VMS_1.0_rus.sis
Warelex.Mobiola.WebCam.USB.v1.00.S60.SymbianOS.Cra cked-BiNPDA.sis
Warelex.Mobiola.WebCam.v1.04.S60.SymbianOS.Cracked-BiNPDA.sis

Repacked Viruses:
Byakugan screensaver.sis
Cheat of all game.sis
DooMsDAY-BeNPDA.sis
FightNightRound3 v1.02 3D.sis
Free gprs.sis
IRremote v2.03 os8.os8.1.sis
karaoke.play-7610.6630.6680.N70.sis
kilabot virus.sis
krian_C.sis-my own made virus
krian_D.sis-my own made virus
LockNLoad3 evolution v1.02.sis
Mp3_DJ-mixer-S60by_Great_ReHMAN+919831195560.sis
Mp3_mixer1.6s60x.sis
N-Gage-game_Driver_for_S60_Great_ReHMAN+919831195560.sis
Nightmare keygen.sis
Nightmare3D v1.02 cracked.sis
Pamela Anderson Naked Theme.sis-my own made virus
Pasaload Stealer.sis_S60v1&2.sis
photobase.v2.0.Crack-BeNPDA.sis
Symantec Antivirus 2008 from Nokia.sis
Wademon Virus-v1.sis
Wapdemon Virus-v2.sis
WYVERN ziruz.sis

MacOSX:
macOSX - virus.sit

Virus Tools:
Biennale.py
Create Commwarrior.zip
datamessage.rar
Easy Symbian Virus Creator.zip
errormail.zip
Mobler Source Code (VB6 App).zip
SMSDOS.ZIP
Symbian Killer.zip
SMS Virus.txt
virus for mobile.rar
virus mobile.zip
Virus_alert.exe

Symbian OS Mobile Virus

Worm.SymbOS.Cabir.a
Cabir is the first network worm capable of spreading via Bluetooth; it infects mobile phones which run Symbian OS.
A wide range of phones from a numb
er of manufacturers use this technology

.
It is clear that Nokia 3650, 7650 and N-Gage phones can all be infected by Cabir.
However, any handset running Symbian OS is potentially vulnerable to infection.

Where ?

?:\system\apps\caribe\caribe.app
?:\system\apps\caribe\flo.mdl
?:\system\apps\caribe\caribe.rsc

C:\SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\ CARIBE.SIS
C:\SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\ CARIBE.APP
C:\SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\ CARIBE.RSC
C:\SYSTEM\RECOGS\FLO.MDL


They are identical, except that one version, when displaying a Window Alert text, will include the text line VZ/29a.

The worm itself is an SIS format file, called caribe.sis, of 15092 bytes in size (the second version is 15104 bytes in size)

File berisi :
+ caribe.app: 11932 bytes/ 11944 bytes in size
+ flo.mdl: 2544 bytes in size
+ caribe.rsc: 44 bytes in size
also you can remove with this decabir.
Attached Files
File Type: sis decabir.sis (7.7 KB, 319 views)
Worm.SymbOS.Cabir.b

This malicious program is a womr which runs under Symbian.
The worm itself is a SIS file.
The file is 10,000 bytes in size.
The file spreads via Bluetooth.

Dimana?


C:\system\apps\OIDI500\OIDI500.aif — is an executable EPOC file, and is 11932 bytes in size. This is the main worm file.
C:\system\apps\OIDI500\OIDI500.app — is a file containing program resources.
C:\system\apps\OIDI500\OIDI500.mdl — ensures that the malicous program will be automatically started if the device is rebooted.
C:\system\apps\OIDI500\OIDI500.rsc — is the application
icon file.




Ketika sudah terinstal >>

Once the device has been infected, a file called C\:SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMA\CARIB E.SIS.It is this file which will be transmitted in order to infect other devices.
The worm then scans for accessible devices which have Bluetooth enabled.
The worm will choose the first accessible device in the list and attempt to send caribe.sis to this device.
The worm has no malicious payload apart from its propagation routine.
However, the worm's presence in memory and its attempts to scan for accessible Bluetooth devices may cause an infected device to become unstable.

Removal Instruction at


C:\system\apps\OIDI500\OIDI500.aif
C:\system\apps\OIDI500\OIDI500.app
C:\system\apps\OIDI500\OIDI500.mdl
C:\system\apps\OIDI500\OIDI500.rsc
C:\SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMA\CARIB E.SIS
Worm.SymbOS.Cabir.d

This malicious program is a worm which runs under Symbian.
The worm itself is a SIS file.
The file is 13,200 bytes in size.
It spreads via Bluetooth.

Where ?
C:\SYSTEM\apps\MYTITI\MYTITI.app is an executable EPOC file, and is 11,932 bytes in size. This is the main worm file;
C:\SYSTEM\apps\MYTITI\MYTITI.rsc is the worm's resource file;
C:\SYSTEM\apps\MYTITI\flo.mdl ensures that the malicous program will be automatically started if the device is rebooted.



When installed >>

Once the device has been infected, a file called C\:SYSTEM\SYMBIANSECUREDATA\CARIBESECURITYMA\CARIB E.SIS is created.
It is this file which will be transmitted in order to infect other devices.
The worm then scans for accessible devices which have Bluetooth enabled.
The worm will choose the first accessible device in the list and attempt to send caribe.sis to this device.
The worm has no malicious payload apart from its propagation routine.
However, the worm's presence in memory and its attempts to scan for accessible Bluetooth devices may cause an infected device to become unstable. *poDo wAe*

Removal Instruction at
C:\SYSTEM\apps\MYTITI\flo.mdl
C:\SYSTEM\apps\MYTITI\MYTITI.app
C:\SYSTEM\apps\MYTITI\MYTITI.rsc
C:\SYSTEM\SYMBIANSECUREDATA\MYTITISECURITYMANAGER\ MYTITI.SIS
Worm.SymbOS.Cabir.k

This worm is programmed for mobile phones running Symbian OS.
The worm itself is an SIS file named caribe.sis.
The file is 17596 bytes in size.
The file contains three other files:

- caribe.app: approximately 14440 bytes in size
- flo.mdl: approximately 2540 bytes in size
- caribe.rsc: 44 bytes in size


Where?

c:\System\apps\caribe\caribe.app
c:\system\apps\caribe\flo.mdl
c:\system\apps\caribe\caribe.rsc

C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.SIS
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.APP
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.RSC
C:SYSTEMRECOGSFLO.MDL

C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.SIS
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERINFO .SIS


When Installed >>

Akan muncul pesan di tampilan depan hape
Code:
"Caribe Version 2 - ValleZ/29a"


Each time the user switches on the infected telephone, the worm will scan the list of active BlueTooth connections.
IT will then select the first connection listed as accessible, and will attempt to send the main file to the device.
The recipient will see the following message:
Code:
Install Caribe?

f the recipient answers yes, then the infected file will be accepted, and the user will be asked if they wish to launch the file.
This depends on the model of the telephone - please see the description of Worm.SymbOS.Cabir.a for further details)
n addition to this, the worm, unlike previous versions of Cabir, is able to self replicate via MMS.
It will automatically answer any incoming SMS or MMS with an MMS which includes an attached copy of the infected file.

Removal Instruction at

c:systemappscaribecaribe.app
c:systemappscaribeflo.mdl
c:systemappscaribecaribe.rsc

C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.SIS
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.APP
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.RSC
C:SYSTEMRECOGSFLO.MDL
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERCARI BE.SIS
C:SYSTEMSYMBIANSECUREDATACARIBESECURITYMANAGERINFO .SIS
Virus.WinCE.Duts.a

WinCE.Duts.a is the first virus for devices running under Windows CE .NET.
It can infect devices running the following operating systems: PocketPC 2000, PocketPC 2002, PocketPC 2003.
The virus itself is an ARM processor program and is 1520 bytes in size.
When run, the program displays the following message:




When Installed >>

If confirmation is given, the virus will infect executable files which correspond to the following criteria: ARM processor, more than 4KB in size, located in the device's root directory (My device).
The virus writes itself to the last section of these files and establishes an entry point at the beginning of the file.
Infected files will contain the signature 'atar' in an unused PE header.
Worm.SymbOS.Lasco.a

Worm.SymbOS.Lasco.a is a worm capable of infecting PDAs and mobile phones running under Symbian OS.
Lasco spreads to executable files [SIS archives] on the infected device, making it the first virus for this platform.
Lasco.a was written by the author of the most recent versions of Worm.SymbOS.Cabir and based on Cabir's source code.
Lasco.a replicates via BlueTooth in the same way as Cabir does.
In addition to replicating via BlueTooth, Lasco.a also infects files.
When executing, it scans the disk for SIS archives, and attempts to infect these files found by inserting its code.
Lasco.a has been developed in two ways: one is an application for the Win32 platform, which infects SIS files, and the other is for the Symbian platform.

* velasco.sis is 15750 bytes in size, and contains the code of the virus itself
* sisinfect.exe is 69632 bytes in size, and is an infector developed for Windows. This file will scan local disks for SIS files and infect them by inserting the contents of velasco.sis.
* marcos.sis is 1579 bytes in size and contains a module, marco.mdl, which installs velasco.sis into the Symbian autostart system.

Removal Instruction at

C:\SYSTEM\SYMBIANSECUREDATA\VELASCO\*
C:\SYSTEM\RECOGS\MARCOS.MDL
Trojan.SymbOS.Skuller.a

This Trojan program infects mobile phones running Symbian.
Any mobile running Symbian is potentially vulnerable.
The Trojan itself is an SIS file, usually called 'extendedtheme.sis', although it may have a different name.
The file is 1,192,117 bytes in size.
The Trojan was distributed via a range of mobile phone forums.
It was presented as a program with new icons, new wallpaper etc.

Setelah terInstall, Trojan membuat file dan aplikasi2 baru :

Code:

* .\System\Apps\About\About.aif
* .\System\Apps\About\About.app

* .\System\Apps\AppInst\AppInst.aif
* .\System\Apps\AppInst\Appinst.app

* .\System\Apps\AppMngr\AppMngr.aif
* .\System\Apps\AppMngr\Appmngr.app

* .\System\Apps\Autolock\Autolock.aif
* .\System\Apps\Autolock\Autolock.app

* .\System\Apps\Browser\Browser.aif
* .\System\Apps\Browser\Browser.app

* .\System\Apps\BtUi\BtUi.aif
* .\System\Apps\BtUi\BtUi.app

* .\System\Apps\bva\bva.aif
* .\System\Apps\bva\bva.app

* .\System\Apps\Calcsoft\Calcsoft.aif
* .\System\Apps\Calcsoft\Calcsoft.app

* .\System\Apps\Calendar\Calendar.aif
* .\System\Apps\Calendar\Calendar.app

* .\System\Apps\Camcorder\Camcorder.aif
* .\System\Apps\Camcorder\Camcorder.app

* .\System\Apps\CbsUiApp\CbsUiApp.aif
* .\System\Apps\CbsUiApp\CbsUiApp.app

* .\System\Apps\CERTSAVER\CERTSAVER.aif
* .\System\Apps\CERTSAVER\CERTSAVER.APP

* .\System\Apps\Chat\Chat.aif
* .\System\Apps\Chat\Chat.app

* .\System\Apps\ClockApp\ClockApp.aif
* .\System\Apps\ClockApp\ClockApp.app

* .\System\Apps\CodViewer\CodViewer.aif
* .\System\Apps\CodViewer\CodViewer.app

* .\System\Apps\ConnectionMonitorUi\ConnectionMonito rUi.aif
* .\System\Apps\ConnectionMonitorUi\ConnectionMonito rUi.app

* .\System\Apps\Converter\Converter.aif
* .\System\Apps\Converter\converter.app

* .\System\Apps\cshelp\cshelp.aif
* .\System\Apps\cshelp\cshelp.app

* .\System\Apps\DdViewer\DdViewer.aif
* .\System\Apps\DdViewer\DdViewer.app

* .\System\Apps\Dictionary\Dictionary.aif
* .\System\Apps\Dictionary\dictionary.app

* .\System\Apps\FileManager\FileManager.aif
* .\System\Apps\FileManager\FileManager.app

* .\System\Apps\GS\GS.aif
* .\System\Apps\GS\gs.app

* .\System\Apps\ImageViewer\ImageViewer.aif
* .\System\Apps\ImageViewer\ImageViewer.app

* .\System\Apps\location\location.aif
* .\System\Apps\location\location.app

* .\System\Apps\Logs\Logs.aif
* .\System\Apps\Logs\Logs.app

* .\System\Apps\mce\mce.aif
* .\System\Apps\mce\mce.app

* .\System\Apps\MediaGallery\MediaGallery.aif
* .\System\Apps\MediaGallery\MediaGallery.app

* .\System\Apps\MediaPlayer\MediaPlayer.aif
* .\System\Apps\MediaPlayer\MediaPlayer.app

* .\System\Apps\MediaSettings\MediaSettings.aif
* .\System\Apps\MediaSettings\MediaSettings.app

* .\System\Apps\Menu\Menu.aif
* .\System\Apps\Menu\Menu.app

* .\System\Apps\mmcapp\mmcapp.aif
* .\System\Apps\mmcapp\mmcapp.app

* .\System\Apps\MMM\MMM.app

* .\System\Apps\MmsEditor\MmsEditor.aif
* .\System\Apps\MmsEditor\MmsEditor.app

* .\System\Apps\MmsViewer\MmsViewer.aif
* .\System\Apps\MmsViewer\MmsViewer.app

* .\System\Apps\MsgMailEditor\MsgMailEditor.aif
* .\System\Apps\MsgMailEditor\MsgMailEditor.app

* .\System\Apps\MsgMailViewer\MsgMailViewer.aif
* .\System\Apps\MsgMailViewer\MsgMailViewer.app

* .\System\Apps\MusicPlayer\MusicPlayer.aif
* .\System\Apps\MusicPlayer\MusicPlayer.app

* .\System\Apps\Notepad\Notepad.aif
* .\System\Apps\Notepad\Notepad.app

* .\System\Apps\NpdViewer\NpdViewer.aif
* .\System\Apps\NpdViewer\NpdViewer.app

* .\System\Apps\NSmlDMSync\NSmlDMSync.aif
* .\System\Apps\NSmlDMSync\NSmlDMSync.app

* .\System\Apps\NSmlDSSync\NSmlDSSync.aif
* .\System\Apps\NSmlDSSync\NSmlDSSync.app

* .\System\Apps\Phone\Phone.aif
* .\System\Apps\Phone\Phone.app

* .\System\Apps\Phonebook\Phonebook.aif
* .\System\Apps\Phonebook\Phonebook.app

* .\System\Apps\Pinboard\Pinboard.aif
* .\System\Apps\Pinboard\Pinboard.app

* .\System\Apps\PRESENCE\PRESENCE.aif
* .\System\Apps\PRESENCE\PRESENCE.APP

* .\System\Apps\ProfileApp\ProfileApp.aif
* .\System\Apps\ProfileApp\profileapp.app

* .\System\Apps\ProvisioningCx\ProvisioningCx.aif
* .\System\Apps\ProvisioningCx\ProvisioningCx.app

* .\System\Apps\PSLN\PSLN.aif
* .\System\Apps\PSLN\PSLN.app

* .\System\Apps\PushViewer\PushViewer.aif
* .\System\Apps\PushViewer\PushViewer.app

* .\System\Apps\Satui\Satui.aif
* .\System\Apps\Satui\Satui.app

* .\System\Apps\SchemeApp\SchemeApp.aif
* .\System\Apps\SchemeApp\SchemeApp.app

* .\System\Apps\ScreenSaver\ScreenSaver.aif
* .\System\Apps\ScreenSaver\ScreenSaver.app

* .\System\Apps\Sdn\Sdn.aif
* .\System\Apps\Sdn\Sdn.app

* .\System\Apps\SimDirectory\SimDirectory.aif
* .\System\Apps\SimDirectory\SimDirectory.app

* .\System\Apps\SmsEditor\SmsEditor.aif
* .\System\Apps\SmsEditor\SmsEditor.app

* .\System\Apps\SmsViewer\SmsViewer.aif
* .\System\Apps\SmsViewer\SmsViewer.app

* .\System\Apps\Speeddial\Speeddial.aif
* .\System\Apps\Speeddial\Speeddial.app

* .\System\Apps\Startup\Startup.aif
* .\System\Apps\Startup\Startup.app

* .\System\Apps\SysAp\SysAp.aif
* .\System\Apps\SysAp\SysAp.app

* .\System\Apps\ToDo\ToDo.aif
* .\System\Apps\ToDo\ToDo.app

* .\System\Apps\Ussd\Ussd.aif
* .\System\Apps\Ussd\Ussd.app

* .\System\Apps\VCommand\VCommand.aif
* .\System\Apps\VCommand\VCommand.app

* .\System\Apps\Vm\Vm.aif
* .\System\Apps\Vm\Vm.app

* .\System\Apps\Voicerecorder\Voicerecorder.aif
* .\System\Apps\Voicerecorder\Voicerecorder.app

* .\System\Apps\WALLETAVMGMT\WALLETAVMGMT.aif
* .\System\Apps\WALLETAVMGMT\WALLETAVMGMT.APP

* .\System\Apps\WALLETAVOTA\WALLETAVOTA.aif
* .\System\Apps\WALLETAVOTA\WALLETAVOTA.APP



and then at Libs folder

Code:

* .\System\Libs\licencemanager20s.dll
* .\System\Libs\lmpro.r01
* .\System\Libs\lmpro.r02
* .\System\Libs\notification.cmd
* .\System\Libs\softwarecopier200.dll
* .\System\Libs\ZLIB.DLL



Trojan.SymbOS.Locknut.a

This Trojan is an application for Symbian, and is an SIS archive 1 - 2 KB in size.

Where ?

?\system\apps\gavno\gavno.app
?\system\apps\gavno\gavno.rsc
?\system\apps\gavno\gavno_caption.rsc

All these files contain text in Russian, and do not contain service information appropriate to the format.
If an attempt is made to launch the .app file, which is not in fact executable, an operating system error will occur.
This means that the infected mobile device may lose part of its functionality.

Removal Instruction at


?\system\apps\gavno\gavno.app
?\system\apps\gavno\gavno.rsc
?\system\apps\gavno\gavno_caption.rsc
?\system\installed\gavno.sis


Worm.SymbOS.Comwar.a

This is the first worm for mobiles phones which is able to propagate via MMS.
It infects telephones running under OS Symbian Series 60.
The executable worm file is packed into a Symbian archive (*.SIS).
The archive is approximately 27 - 30KB in size.
The name of the file varies: when propagating via Bluetooth, the worm creates a random file name, which will be 8 characters long.
ex : bg82o_s1.sis

Where ?

?\system\apps\CommWarrior\commwarrior.exe
?\system\apps\CommWarrior\commrec.mdl
?\system\updates\commwarrior.exe
?\system\updates\commrec.mdl
?\system\updates\commw.sis


The worm propagates via Bluetooth and MMS.
Once launched, the worm will search for accessible Bluetooth devices and send the infected .SIS archive
under a random name to these devices. In order to open the attachment (which will consequently infect the telephone)
the user will have to confirm several times that he wishes to receive the file.

kLo MMS uda terkirim, akan muncul pesan berikut kpd si penerima :
Code:

* Norton AntiVirus Released now for mobile, install it!
* 3DGame 3DGame from me. It is FREE !
* 3DNow! 3DNow!(tm) mobile emulator for *GAMES*.
* Audio driver Live3D driver with polyphonic virtual speakers!
* CheckDisk *FREE* CheckDisk for SymbianOS released!MobiComm
* Desktop manager Official Symbian desctop manager.
* Display driver Real True Color mobile display driver!
* Dr.Web New Dr.Web antivirus for Symbian OS. Try it!
* Free SEX! Free *SEX* software for you!
* Happy Birthday! Happy Birthday! It is present for you!
* Internet Accelerator Internet accelerator, SSL security update #7.
* Internet Cracker It is *EASY* to *CRACK* provider accounts!
* MS-DOS MS-DOS emulator for SymbvianOS. Nokia series 60 only. Try it!
* MatrixRemover Matrix has you. Remove matrix!
* Nokia ringtoner Nokia RingtoneManager for all models.
* PocketPCemu PocketPC *REAL* emulator for Symbvian OS! Nokia only.
* Porno images Porno images collection with nice viewer!
* PowerSave Inspector Save you battery and *MONEY*!
* Security update #12 Significant security update. See www.symbian.com
* Symbian security update See security news at www.symbian.com
* SymbianOS update OS service pack #1 from Symbian inc.
* Virtual SEX Virtual SEX mobile engine from Russian hackers!
* WWW Cracker Helps to *CRACK* WWW sites like hotmail.com



Removal Instruction at

?\system\apps\CommWarrior\commwarrior.exe
?\system\apps\CommWarrior\commrec.mdl
?\system\updates\commwarrior.exe
?\system\updates\commrec.mdl
?\system\updates\commw.sis
Trojan.SymbOS.Appdisabler.a

This Trojan infects mobile phones running Symbian.
The Trojan substitutes non-functional files for some system applications.
The Trojan itself is an SIS installer file for Symbian 60 Series.
The file is 31210 bytes in size, and may be called freetalktime.sis.

Dimana?
Ada 53 File :

? aghu.txt (275 bytes)
?Images aghu.txt (275 bytes)
?Images aghu crack.jpg (12554 bytes)
?systemapps
A-RAGHU.txt (201 bytes)
?systemappsRAGHU aghu.app (6864 bytes)
?systemappsRAGHUMenu aghumenu.app (5332 bytes)
?systemappsRAGHUMenu aghumenu.rsc (60 bytes)
?systemappsRAGHUMenuRAGHUMenu_caption.rsc (28 bytes)

This pict is the owner of this malware.



?systemappsAD7650
?systemappsAnswRec
?systemappsBlackList
?systemappsBlueJackX
?systemappscallcheater
?systemappsCallManager
?systemappsCamcoder
?systemappscamerafx
?systemappsETICamcorder
?systemappsETIMovieAlbum
?systemappsETIPlayer
?systemappsextendedrecorder
?systemappsFaceWarp
?systemappsFExplorer
?systemappsFSCaller
?systemappsHair
?systemappsHantroCP
?systemappsirremote
?systemappsJelly
?systemappsKPCaMain
?systemappsLauncher
?systemappslogoMan
?systemappsMIDIED
?systemappsmmp
?systemappsMp3Go
?systemappsMp3Player
?systemappsphotoacute
?systemappsPhotoEditor
?systemappsPhotographer
?systemappsPhotoSafe
?systemappsPhotoSMS
?systemappsPVPlayer
?systemappsRallyProContest
?systemapps ealplayer
?systemappsRingMaster
?systemappsSmartAnswer
?systemappsSmartMovie
?systemappsSmsMachine
?systemappsSounder
?systemappssSaver
?systemappsSystemExplorer
?systemappsUltraMP3
?systemappsUVSMStyle
?systemappsWILDSKIN

Ni text yg ada di pilus :

Code:
----R A G H U----

VIRUS BORN IN SURAT(GUJRAT/INDIA/ASIA).

THE NAME OF THIS VIRUS IS RAGHU....
U KNOW WHY....????????

BECAUSE I LIKE VASTAV MOVIE AND SANJU BABA.

U LIKE THIS VIRUS?

SO MANY SOFTWARE CRACKS AND VIRUS AVAILABLE SOON....

RAGHU NAM HE RAGHU...



Removal Instruction at

above
Trojan-SMS.J2ME.RedBrowser.a

This Trojan infects mobile phones running Java (J2ME).
The Trojan spreads in the guise of a program called "RedBrowser",
which allegedly enables the user to visit WAP sites without using a WAP connection.
According to the Trojan's author, this is made possible by sending and receiving free SMSs.
In a
ctual fact, the Trojan only sends SMSs to premium rate numbers, at a rate of $5 - $6 per SMS.
The Trojan is a Java application, a JAR format archive.
The file may be called "redbrowser.jar", and is 54482 bytes in size.
The Trojan can be downloaded to the victim handset either via the Internet (from a WAP site)
or via Bluetooth or a personal computer.
Dimana?

* FS.class - auxiliary file (2719 bytes in size)
* FW.class - auxiliary file (2664 bytes in size)
* icon.png - grap
hics file (3165 bytes in size)
* logo101.png - graphics file (16829 bytes in size)
* logo128.pnh - graphics file (27375 bytes in size)
* M.class - interface file (5339 bytes in size)
* SM.class - Trojan application which sends SMS messages (1945 bytes in size)


Removal Instruction at


Actually, if you already run this App, just press Off Call or Off phone then go to App Manager > Uninstall it immediately.
Trojan:SymbOS/Blankfont.A
BlankFont.a is a SIS file trojan that installs a corrupted Font file.

Just like this if i installed it.



then it will put the File *.gdr on



Code:
C:\System\Fonts\Panic.gdr
removal instruction

Open any File Explorer like X-Plore, then go to that Folder and rename it to anything what you want. Reboot, go to that Folder again and Delete the Folder.
Botton.a

This Trojan is unknown bcouse i haven't installed it.

Then, if i installed it will put the files on :
Code:
C:\System\apps\Appctrl\Appctrl.app
C:\System\apps\Appctrl\Appctrl.aif
C:\System\apps\Appctrl\Appinst.app
C:\System\apps\Appctrl\Appinst.aif
C:\System\apps\Appinst\Appmngr.app
C:\System\apps\Appinst\Appmngr.aif
C:\System\apps\BtUi\BtUi.app
C:\System\apps\BtUi\BtUi.aif
C:\System\apps\Camcorder\Camcorder.app
C:\System\apps\CamcorderCamcorder.aif
C:\System\apps\Camera\Camera.app
C:\System\apps\Camera\Camera.aif
C:\System\apps\efileman\efileman.app
C:\System\apps\efileman\efileman.aif
C:\System\apps\FExplorer\FExplorer.app
C:\System\apps\FExplorer\FExplorer.aif
C:\System\apps\FExplorer\FExplorer_caption.rsc
C:\System\apps\File\File.app
C:\System\apps\File\File.aif
C:\System\apps\FileManager\FileManager.app
C:\System\apps\FileManager\FileManager.aif
C:\System\apps\ILoveU\ILoveU.app
C:\System\apps\ILoveU\ILoveU.aif
C:\System\apps\ILoveU\ILoveU.RSC
C:\System\apps\ILoveU\ILU.mdl
C:\System\apps\IrApp\IrApp.app
C:\System\apps\IrApp\IrApp.aif
C:\System\apps\Logs\Logs.app
C:\System\apps\Logs\Logs.aif
C:\System\apps\mce\mce.app
C:\System\apps\mce\mce.aif
C:\System\apps\MediaGallery\MediaGallery.app
C:\System\apps\MediaGallery\MediaGallery.aif
C:\System\apps\Menu\Menu.app
C:\System\apps\Menu\Menu.aif
C:\System\apps\Phone\Phone.app
C:\System\apps\Phone\Phone.aif
C:\System\apps\Phonebook\Phonebook.app
C:\System\apps\Phonebook\Phonebook.aif
C:\System\apps\SymCommander\SymCommander.app
C:\System\apps\SymCommander\SymCommander.aif
C:\System\apps\SystemExplorer\SystemExplorer.app
C:\System\apps\SystemExplorer\SystemExplorer.aif
C:\System\RECOGS\ILU.mdl
C:\System\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\Dont4get2readme.txt
The *.txt files showed us :
Code:
Saying HELLO From Here (SYRIA)
TO All The WORLD !!!
I Wish U N-Joy UR
Damaged Device ..
U Know, Not all may Read These Words But,
No Problem Bcuz Some will,
But even This, Thats The Way I Love U All ...
;-)
Regards,
ThNdRbRd
Removal Instruction above





Cadomesk.A

This is a Symbian Series 60 trojan that installs Cabir, Skulls, Doomboot, and Bootton trojan into the Series 60 handsets.

Trojan tested using NOKIA 6680 ( Symbian OS 8.0)

Positive analysis results:

This trojan is prove to be succeed performs its malicious activities in NOKIA 6680. As usual, this trojan applied skulls technique to disable some of the application in the phone by replacing non-functional or corrupted files with the original one. However, some of the application still working because those files was replaced by Booton.A trojan which changed the actual icon of the application into a love icon while the application is still working. This malware also drops doomboot.A trojan in the process while attacking the phone. After my phone has been restarted, when accessing the menu system, my phone auto restart. McAfee AVERT (Anti-Virus Emergency Responding Team) mentioned that this trojan will disable the phone from startup but I notice that it does not successfully perform its action in NOKIA 6680.



Where ?
Code:
?:\System\Apps\About\About.app
?:\System\Apps\About\About.aif
?:\System\Apps\AntiVirus\AntiVirus.app
?:\System\Apps\Anti-Virus\backup\AVBioIcons.mbm
?:\System\Apps\Anti-Virus\backup\FSBioMessage.bif
?:\System\Apps\Anti-Virus\backup\FSBioMessageParser.dll
?:\System\Apps\Anti-Virus\Anti-Virus.app
?:\System\Apps\Anti-Virus\Anti-Virus.aif
?:\System\Apps\Anti-Virus\Anti-Virus.rsc
?:\System\Apps\Anti-Virus\FSAV.dll
?:\System\Apps\Anti-Virus\FSAVDT.exe
?:\System\Apps\Anti-Virus\FSAVEPOC.DAT
?:\System\Apps\Anti-Virus\FsAVUpdater.aif
?:\System\Apps\Anti-Virus\FsAVUpdater.app
?:\System\Apps\Anti-Virus\FsAVUpdater.rsc
?:\System\Apps\Anti-Virus\FSSched.aif
?:\System\Apps\Anti-Virus\FSSched.app
?:\System\Apps\Anti-Virus\FSSched.rsc
?:\System\Apps\Anti-Virus\FSSMSManager.dll
?:\System\Apps\Anti-Virus\FSUpdateManager.dll
?:\System\Apps\Anti-Virus\Hydra1.DLL
?:\System\Apps\Appctrl\Appctrl.app
?:\System\Apps\Appctrl\Appctrl.aif
?:\System\Apps\AppInst\AppInst.app
?:\System\Apps\AppInst\AppInst.aif
?:\System\Apps\AppMngr\AppMngr.app
?:\System\Apps\AppMngr\AppMngr.aif
?:\System\Apps\Autolock\Autolock.app
?:\System\Apps\Autolock\Autolock.aif
?:\System\Apps\bootdata\bootdata.app
?:\System\Apps\bootdata\bootdata.aif
?:\System\Apps\Browser\Browser.app
?:\System\Apps\Browser\Browser.aif
?:\System\Apps\BtUi\BtUi.app
?:\System\Apps\BtUi\BtUi.aif
?:\System\Apps\bva\bva.app
?:\System\Apps\bva\bva.aif
?:\System\Apps\cabirfix\cabirfix.app
?:\System\Apps\Calcsoft\Calcsoft.app
?:\System\Apps\Calcsoft\Calcsoft.aif
?:\System\Apps\Calendar\Calendar.app
?:\System\Apps\Calendar\Calendar.aif
?:\System\Apps\Camcorder\Camcorder.app
?:\System\Apps\Camcorder\Camcorder.aif
?:\System\Apps\Camera\Camera.app
?:\System\Apps\Camera\Camera.aif
?:\System\Apps\CbsUiApp\CbsUiApp.app
?:\System\Apps\CbsUiApp\CbsUiApp.aif
?:\System\Apps\CERTSAVER\CERTSAVER.app
?:\System\Apps\CERTSAVER\CERTSAVER.aif
?:\System\Apps\Chat\Chat.app
?:\System\Apps\Chat\Chat.aif
?:\System\Apps\ClockApp\ClockApp.app
?:\System\Apps\ClockApp\ClockApp.aif
?:\System\Apps\CodViewer\CodViewer.app
?:\System\Apps\CodViewer\CodViewer.aif
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.app
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.aif
?:\System\Apps\Converter\Converter.app
?:\System\Apps\Converter\Converter.aif
?:\System\Apps\cshelp\cshelp.app
?:\System\Apps\cshelp\cshelp.aif
?:\System\Apps\data\data.app
?:\System\Apps\data\data_CAPTION.rsC
?:\System\Apps\DdViewer\DdViewer.app
?:\System\Apps\DdViewer\DdViewer.aif
?:\System\Apps\Decabir\Decabir.app
?:\System\Apps\Dictionary\Dictionary.app
?:\System\Apps\Dictionary\Dictionary.aif
?:\System\Apps\Disinfect\Disinfect.app
?:\System\Apps\efileman\efileman.app
?:\System\Apps\efileman\efileman.aif
?:\System\Apps\FExplorer\FExplorer.app
?:\System\Apps\FExplorer\FExplorer.aif
?:\System\Apps\FExplorer\FExplorer_caption.rsc
?:\System\Apps\file\File.app
?:\System\Apps\file\File.aif
?:\System\Apps\FileManager\FileManager.app
?:\System\Apps\FileManager\FileManager.aif
?:\System\Apps\FileView\FileView.app
?:\System\Apps\FileView\FileView.aif
?:\System\Apps\freakappctrl\freakappctrl.app
?:\System\Apps\freakbtui\freakbtui.app
?:\System\Apps\GS\gs.app
?:\System\Apps\GS\GS.aif
?:\System\Apps\ILoveU\ILoveU.app
?:\System\Apps\ILoveU\ILoveU.aif
?:\System\Apps\ILoveU\ILoveU.rsc
?:\System\Apps\ILoveU\ILU.mdl
?:\System\Apps\ImageViewer\ImageViewer.app
?:\System\Apps\ImageViewer\ImageViewer.aif
?:\System\Apps\IrApp\IrApp.app
?:\System\Apps\IrApp\IrApp.aif
?:\System\Apps\location\location.app
?:\System\Apps\location\location.aif
?:\System\Apps\Logs\Logs.app
?:\System\Apps\Logs\Logs.aif
?:\System\Apps\mce\mce.app
?:\System\Apps\mce\mce.aif
?:\System\Apps\MediaGallery\MediaGallery.app
?:\System\Apps\MediaGallery\MediaGallery.aif
?:\System\Apps\MediaPlayer\MediaPlayer.app
?:\System\Apps\MediaPlayer\MediaPlayer.aif
?:\System\Apps\MediaSettings\MediaSettings.app
?:\System\Apps\MediaSettings\MediaSettings.aif
?:\System\Apps\Menu\Menu.app
?:\System\Apps\Menu\Menu.aif
?:\System\Apps\mmcapp\mmcapp.app
?:\System\Apps\mmcapp\mmcapp.aif
?:\System\Apps\MMM\MMM.app
?:\System\Apps\MMM\MMM.aif
?:\System\Apps\MmsEditor\MmsEditor.app
?:\System\Apps\MmsEditor\MmsEditor.aif
?:\System\Apps\MmsViewer\MmsViewer.app
?:\System\Apps\MmsViewer\MmsViewer.aif
?:\System\Apps\MsgMailEditor\MsgMailEditor.app
?:\System\Apps\MsgMailEditor\MsgMailEditor.aif
?:\System\Apps\MsgMailViewer\MsgMailViewer.app
?:\System\Apps\MsgMailViewer\MsgMailViewer.aif
?:\System\Apps\MusicPlayer\MusicPlayer.app
?:\System\Apps\MusicPlayer\MusicPlayer.aif
?:\System\Apps\nokiaapps\nokiaapps.app
?:\System\Apps\nokiaapps\nokiaapps.aif
?:\System\Apps\nokiafile\nokiafile.app
?:\System\Apps\nokiafile\nokiafile.aif
?:\System\Apps\Notepad\Notepad.app
?:\System\Apps\Notepad\Notepad.aif
?:\System\Apps\NpdViewer\NpdViewer.app
?:\System\Apps\NpdViewer\NpdViewer.aif
?:\System\Apps\NSmlDMSync\NSmlDMSync.app
?:\System\Apps\NSmlDMSync\NSmlDMSync.aif
?:\System\Apps\NSmlDSSync\NSmlDSSync.app
?:\System\Apps\NSmlDSSync\NSmlDSSync.aif
?:\System\Apps\OIDI500\OIDI500.app
?:\System\Apps\OIDI500\OIDI500.aif
?:\System\Apps\OIDI500\OIDI500.rsc
?:\System\Apps\OIDI500\OIDI500.mdl
?:\System\Apps\Phone\Phone.app
?:\System\Apps\Phone\Phone.aif
?:\System\Apps\Phonebook\Phonebook.app
?:\System\Apps\Phonebook\Phonebook.aif
?:\System\Apps\Pinboard\Pinboard.app
?:\System\Apps\Pinboard\Pinboard.aif
?:\System\Apps\pjBLUE\pjBLUE.app
?:\System\Apps\pjBLUE\pjBLUE.aif
?:\System\Apps\pjBLUE\pjBLUE_CAPTION.rsc
?:\System\Apps\PRESENCE\PRESENCE.app
?:\System\Apps\PRESENCE\PRESENCE.aif
?:\System\Apps\ProfiExplorer\ProfiExplorer.app
?:\System\Apps\ProfiExplorer\ProfiExplorer.aif
?:\System\Apps\ProfileApp\ProfileApp.app
?:\System\Apps\ProfileApp\ProfileApp.aif
?:\System\Apps\ProvisioningCx\ProvisioningCx.app
?:\System\Apps\ProvisioningCx\ProvisioningCx.aif
?:\System\Apps\PSLN\PSLN.app
?:\System\Apps\PSLN\PSLN.aif
?:\System\Apps\PushViewer\PushViewer.app
?:\System\Apps\PushViewer\PushViewer.aif
?:\System\Apps\Satui\Satui.app
?:\System\Apps\Satui\Satui.aif
?:\System\Apps\SchemeApp\SchemeApp.app
?:\System\Apps\SchemeApp\SchemeApp.aif
?:\System\Apps\ScreenSaver\ScreenSaver.app
?:\System\Apps\ScreenSaver\ScreenSaver.aif
?:\System\Apps\Sdn\Sdn.app
?:\System\Apps\Sdn\Sdn.aif
?:\System\Apps\SimDirectory\SimDirectory.app
?:\System\Apps\SimDirectory\SimDirectory.aif
?:\System\Apps\SmartFileMan\SmartFileMan.app
?:\System\Apps\SmartFileMan\SmartFileMan.aif
?:\System\Apps\smartmovie\smartmovie.app
?:\System\Apps\SmsEditor\SmsEditor.app
?:\System\Apps\SmsEditor\SmsEditor.aif
?:\System\Apps\SmsViewer\SmsViewer.app
?:\System\Apps\SmsViewer\SmsViewer.aif
?:\System\Apps\Speeddial\Speeddial.app
?:\System\Apps\Speeddial\Speeddial.aif
?:\System\Apps\Startup\Startup.app
?:\System\Apps\Startup\Startup.aif
?:\System\Apps\SymCommander\SymCommander.app
?:\System\Apps\SymCommander\SymCommander.aif
?:\System\Apps\SysAp\SysAp.app
?:\System\Apps\SysAp\SysAp.aif
?:\System\Apps\SystemExplorer\SystemExplorer.app
?:\System\Apps\SystemExplorer\SystemExplorer.aif
?:\System\Apps\Tee222\Tee222.app
?:\System\Apps\Tee222\Tee222.aif
?:\System\Apps\Tee222\Tee222.rsc
?:\System\Apps\Tee222\Tee222_CAPTION.rsc
?:\System\Apps\Tee222\222.mdl
?:\System\Apps\ToDo\ToDo.app
?:\System\Apps\ToDo\ToDo.aif
?:\System\Apps\UltraMP3\UltraMP3.app
?:\System\Apps\UltraMP3\UltraMP3.aif
?:\System\Apps\Ussd\Ussd.app
?:\System\Apps\Ussd\Ussd.aif
?:\System\Apps\VCommand\VCommand.app
?:\System\Apps\VCommand\VCommand.aif
?:\System\Apps\velasco\velasco.app
?:\System\Apps\velasco\velasco.rsc
?:\System\Apps\velasco\marcos.mdl
?:\System\Apps\Vm\Vm.app
?:\System\Apps\Vm\Vm.aif
?:\System\Apps\Voicerecorder\Voicerecorder.app
?:\System\Apps\Voicerecorder\Voicerecorder.aif
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.app
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.aif
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.app
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.aif
?:\System\data\0010155.cfg
?:\System\Fonts\DFT.gdr
?:\System\Fonts\ETel.dll
?:\System\Recogs\$$$.MDL
?:\System\Recogs\mod.MDL
?:\System\Recogs\FSRec.mdl
?:\System\Recogs\YYSBootRec.mdl
?:\System\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\METALG.SIS
?:\ETel.dll
?:\nokia\imags\nokias\DFT God Damn'it!!!\DFT the creator!!!!!.gif
Delete all those
Dampig.a


Dampig.A is a malicious SIS file dropper, that pretends to be a crack for version 3.2 of FSCaller application. The Dampig.A disables some system applications and third party file managers and installs several variants of Cabir worm on the phone.
The Dampig.A trojan disables Bluetooth UI, system file manager, Messaging application and phone book on the infected handheld. Also the Dampig.A will corrupt the uninstallation information in the system installer, so that it cannot be uninstalled without being disinfected first.
The menu application is not disabled, so the user is able to use his phone, and download Anti-Virus to disinfect the phone without any special tool.
None of the Cabir variants installed on the phone will start automatically, but some of the applications that are replaced with Cabir executables, such as Messaging application, will be most likely called and thus executed by the user.
All of the Cabir variants worm dropped by Dampig.A are already detected. So the Dampig.A is already detected and stopped without need for updated Anti-Virus database.
Please note, that even as the FSCaller application that Dampig.A prenteds to crack, has similar name to our product naming. It has nothing to do with F-Secure. FSCaller is software made by SymbianWare OHG in Germany.
Installation to system

When installed Dampig.A will replace most common third party file managers, and key system applications with non-functional versions.

Spreading in

Fscaller3.2Crack7610.sis or vir.sis
Payload

Disables following applications


Bluetooth UI
Camera
FExplorer
Messaging
Phonebook
SmartFileManager
Smartmovie
SystemExplorer
UltraMP3



Where ?
Code:
?:\system\apps\BtUi\BtUi.app
?:\system\apps\BtUi\BtUi.aif
?:\system\apps\BtUi\BtUi.R01
?:\system\apps\BtUi\BtUi.R13
?:\system\apps\BtUi\BtUi_CAPTION.r01
?:\system\apps\BtUi\BtUi_CAPTION.R13
?:\system\apps\Camcoder\Camcoder.app
?:\system\apps\Camcoder\Camcoder.aif
?:\system\apps\Camcoder\Camcoder.rsc
?:\system\apps\Camcoder\Camcoder_CAPTION.rsc
?:\system\apps\Camcoder\flo.mdl
?:\system\apps\FExplorer\FExplorer.app
?:\system\apps\FExplorer\FExplorer.aif
?:\system\apps\FExplorer\FExplorer.rsc
?:\system\apps\FExplorer\FExplorer_CAPTION.rsC
?:\system\apps\FExplorer\flo.mdl
?:\system\apps\File\File.app
?:\system\apps\File\File.aif
?:\system\apps\File\File.rsc
?:\system\apps\File\File_CAPTION.rsC
?:\system\apps\File\flo.mdl
?:\system\apps\FREAKBtUi\FREAKBtUi.app
?:\system\apps\FREAKBtUi\FREAKBtUi.aif
?:\system\apps\FREAKBtUi\FREAKBtUi.R01
?:\system\apps\FREAKBtUi\FREAKBtUi.R13
?:\system\apps\FREAKBtUi\FREAKBtUi_CAPTION.r01
?:\system\apps\FREAKBtUi\FREAKBtUi_CAPTION.R13
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.app
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.aif
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.R01
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.R13
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook_CAPTION.r01
?:\system\apps\FREAKPhoneBook\FREAKPhoneBook.R13
?:\system\apps\iLoveU\iLoveU.app
?:\system\apps\iLoveU\iLoveU.aif
?:\system\apps\iLoveU\iLoveU_CAPTON.rsc
?:\system\apps\iLoveU\iLoveU.rsc
?:\system\apps\iLoveU\flo.mdl
?:\system\apps\MCE\MCE.app
?:\system\apps\MCE\mce.aif
?:\system\apps\MCE\MCE.R01
?:\system\apps\MCE\MCE.R13
?:\system\apps\MCE\MCE_CAPTION.r01
?:\system\apps\MCE\MCE_CAPTION.R13
?:\system\apps\PhoneBook\PhoneBook.app
?:\system\apps\PhoneBook\PhoneBook.aif
?:\system\apps\PhoneBook\PhoneBook.R01
?:\system\apps\PhoneBook\PhoneBook.R13
?:\system\apps\PhoneBook\PhoneBook_CAPTION.r01
?:\system\apps\PhoneBook\PhoneBook_CAPTION.R13
?:\system\apps\SmartFileMan\SmartFileMan.app
?:\system\apps\SmartFileMan\SmartFileMan.aif
?:\system\apps\SmartFileMan\SmartFileMan.rsc
?:\system\apps\SmartFileMan\SmartFileMan_CAPTION
?:\system\apps\SmartFileMan\flo.mdl
?:\system\apps\SmartMovie\SmartMovie.app
?:\system\apps\SmartMovie\SmartMovie.aif
?:\system\apps\SmartMovie\SmartMovie.rsc
?:\system\apps\SmartMovie\SmartMovie_CAPTION.rsc
?:\system\apps\SmartMovie\flo.mdl
?:\system\apps\SystemExplorer\SystemExplorer.app
?:\system\apps\SystemExplorer\SystemExplorer.aif
?:\system\apps\SystemExplorer\SystemExplorer.rsc
?:\system\apps\SystemExplorer\SystemExplorer_CAPTION.rsc
?:\system\apps\SystemExplorer\flo.mdl
?:\system\apps\UltraMP3\UltraMP3.app
?:\system\apps\UltraMP3\UltraMP3.aif
?:\system\apps\UltraMP3\UltraMP3_CAPTION.rsc
?:\system\apps\UltraMP3\UltraMP3.rsc
?:\system\apps\UltraMP3\flo.mdl
?:\system\install\autoexecdaemon.SIS
Kill the Cabir variants that are currently running in the system:
1. Press menu button until you get a list of running applications
2. Kill all applications that look suspicious by pressing 'C' button
Mabir.A
Viruses for mobile phones were developed at first to prove that it is possible, but the new versions have become more and more aggressive.

After Cabir and Commwarrior have showed that viruses for the Symbian Series 60 operating system can spread through MMS, a new virus attacks smartphones: Mabir.A.

Discovered by F-Secure, MabirA has a very interesting spreading procedure.
Instead of reading addresses and phone numbers, Mabir.A intercepts all SMS and MMS messages.
Immediately, the virus will be sent as a MMS message to the number that sent the initial message; the receivers will assume that the message is a reply.

After analyzing the virus, the F-Secure experts have reached the conclusion that the ones responsible for the Cabir virus are also responsible for the new virus. MabirA is derived from the same source code as Cabir.

The fact that viruses aimed at cell phones are targeting MMSs is very troubling considering the costs involved in sending such a message from one network to another or from one country to another.

Moreover, the fact that the new version appears only a few weeks after Cabir is a sign that those involved might prepare other surprises.

Like the first versions of Cabir, Mabir.A is also able to spread through Bluetooth; the virus searches for the closest phone and sends a copy of the virus.



Where ?
Code:
?:\system\apps\caribe\caribe.rsc
?:\system\apps\caribe\flo.mdl
?:\system\apps\carfibe\caribe.app
Locknut.B


Locknut.B is a malicious SIS file trojan that pretends to be patch for Symbian Series 60 mobile phones.

When installed Locknut.B drops a binary that will crash a critical System component, that will prevent any application from being launched in the phone. Thus effectively locking the phone.
The Locknut.B will also drop a copy of Cabir.V into the device, but it will not start automatically. And is harmless anyway as the Locknut.B kills all applications on the infected phone, including Cabir.V that is installed from the same SIS file.

Even if Locknut.B is disinfected the Cabir.V still wont start, as it is installed into wrong directory in the infected phone.

If user starts Cabir.V manually, after disinfecting locknut, the Cabir.V will spread as pure Cabir.V and will not transfer Locknut.B into other devices.


Where ?
Code:
?:\system\Apps\Gavnoreturn\gavnoreturn.app
?:\system\Apps\Gavnoreturn\gavnoreturn.rsc
?:\system\Apps\Gavnoreturn\gavnoreturn_caption.rsc
Spreading in MMFpatch.sis

Locknut.B drops corrupted binary file that will cause crash in a critical operating system component. The locknut.B also drops Cabir.V, which does not start on the phone, unless executed on purpose after disinfection.
Locknut.A

Locknut.A is a malicous SIS file trojan that prentends to be patch for Symbian Series 60 mobile phones.



When installed Locknut.A drops binaries that will crash a critical System component, that will prevent any application from being launched in the phone. Thus effectively locking the phone.




There are also claims that Locknut would disable calling functionality, so that user couldn't make calls with infected
phone. But we could not reproduce this effect with any phones we have.

Also Locknut.A will only work with devices that have Symbian OS 7.0S or newer, devices that use Symbian OS 6.0 or 6.1 are unaffected.

Locknut is targeted against Symbian Series 60 devices, but also series 70 devices, such as Nokia 7710 are vulnerable to Locknut. However when trying to install Skulls trojan on Nokia 7710, user will get a warning that the SIS file is not intended for the device, so risk of accidental infection is low.

Some AV companies call this trojan Gavno, but since this word means rather vulgar term in Russian. AV community has decided to rename it as
Locknut.

There are also versions of Locknut that include Cabir.B in same SIS file, that some companies call Gavno.B. But since the actual trojan functionality is totally identical to Locknut.A we call both samples Locknut.A

The Cabir.B included in the Locknut.A samples is harmless as the Locknut kills all applications on the infected phone, including Cabir.B that is installed from the same SIS file.

Even if Locknut.B is disinfected the Cabir.B still wont start, as it is installed into wrong directory in the infected phone.

If user starts Cabir.B manually, after disinfecting locknut, the
Cabir.B will spread as pure Cabir.B and will not transfer Locknut.A into other devices.




Where ?
Code:
?:\system\Apps\caribe\caribe.aif
?:\system\Apps\caribe\caribe.app
?:\system\Apps\caribe\flo.mdl
?:\system\Apps\gavno\gavno.App
?:\system\Apps\gavno\gavno.Rsc
?:\system\Apps\gavno\gavno_caption.rsc
?:\system\CARIBESECURITYMANAGER\caribe.app
?:\system\CARIBESECURITYMANAGER\caribe.rsc
?:\system\CARIBESECURITYMANAGER\caribe.sis
?:\system\RECOGS\flo.mdl
1. Install f-Locknut.sis into infected phones memory card with a clean phone
2. Put the memory card with F-Locknut into infected phone
3. Start up the infected phone, the application menu should work now
4. Go to application manager and uninstall the SIS file in which you installed the locknut variant
Attached Files
File Type: sis
f-locknut.sis (4.1 KB, 20 views)
Hobbes.A

Hobbes.A is a malicious SIS file trojan that drops corrupted binary that causes the application loader to crash on older phones that use Symbian OS.

The Hobbes.A affects only phones that use Symbian OS version 6.1, which means that only old models such as Nokia NGage and Nokia 3650 are affected by the trojan.


Hobbes.A pretends to be a pirated copy of Symantec Anti-Virus for Symbian phones. The installation package contains texts that instruct user to reboot after installation.



The corrupted binary in Hobbes.A causes OS to fail at boot so that none of the system applications are started. This means that all smartphone functionalities are disabled, calling and receiving calls on the phone works as normal.
Users who have a phone that is infected with Hobbes.A must not reboot their phone, as the damage caused by Hobbes.A is activated only on reboot.

When installed to the system the Hobbes.A installs corrupted version of FExplorer trying to disable FExplorer file manager, but fails as it installs it into incorrect directory.

Hobbes.A also installs several recognizer components to C: and E: drives, one of the components is a corrupted version of legitimate application which is missing it's other components and thus crashing on boot on older Symbian versions.


Where ?
Code:
?:\apps\FExplorer\FExplorer.aif
?:\apps\FExplorer\FExplorer.app
?:\apps\FExplorer\FExplorer.rsc
?:\apps\FExplorer\FExplorer_CAPTION.rsC
?:\apps\FExplorer\flo.mdl >> always use this? :d
?:\system\recogs\jjlas.mdl
?:\system\recogs\RecAppForge.mdl >> Fake of AppBooster
E:\system\apps\FExplorer\FExplorer.mbm
E:\system\recogs\recAutoExec.mdl
E:\system\recogs\UltraMP3Rec.mdl >> we will think this is really from UltraMP3. :D
1. Uninstall the Symantec.sis using application manager

Disinfection is user has rebooted the phone

2. Remove memory card from the phone and boot it again
3. Install some file manager on the phone
4. Go to the memory card and delete file \system\recogs\recAutoExec.mdl
3 SIMPLE STEPS TO REMOVE THIS VIRUS..
If your phone is infected by beselo,it will build some file with randomly name on C/ and E/system/apps/xxxx.Exe and xxxx.Sis(ussually on bottom of apps folder)
all you need is an explorer apps (x-plore or another apps like Fexplorer)first,you must set your
x-plore or Fexplorer to be enable to see hidden and system file.

Here we go,it will take a bit of time,just 3 simple steps...
Step1:
just try to delete this item:
=>C/system/recogs
=>E/system/recogs
note: if you worry about
it,before delete this FOLDER,u can move/back them up into another folder.
This is the key "YOU MUST CERTAINLY DELETE/MOVE THIS FOLDER FROM SYSTEM FOLDER,MAKE THIS FOLDER DISSAPEAR FROM YOUR SYSTEM FOLDER"

step 2:
RESTART your phone

step 3:
using your x-plore again,delete this following item(you have to quick before it works again):
=>C/ and E/system/apps/[xxxxx.Sis] and [xxxxx.Exe]
=>C/system/data/xxxxx.Exe
=>C/system/mail/Mailserver.Exe(under INDEX file)

note:why you must restart your phone?
Because this file [xxxxx.Sis] and [xxxxx.Exe],it can't be deleted, before you RESTART your phone,it will appears and appears again....
Already tested on s60v1 and v2
Code:
http://www.dotsis.com/mobile_phone/showthread.php?t=127798

SymbOS/RommWar.A

is a malicious SIS trojan that installs a malfunctioning system component that cause different behaviour depending on the ROM software version in the device. Different effects witnessed range from freezing of the device requiring a restart, to disabling the power button on the device, or in some cases no apparent effect on device at all.

When a user opens this file, the phone installer will display a dialog to warn users that the application may be coming from an untrusted source and may cause potential problems.



In the case of freezing the device, shortly after the device infected with SymbOS/RommWar.A restarts, it shows a notification similar to the picture above. When this notification is displayed the only working function on the device is the option to power-off.

Depending on the effect caused by SymbOS/RommWar.A, removal of the malfunctioning components might be possible by going to application manager and uninstalling the SIS file in which SymbOS/RommWar.A arrived.

Z:\System\Apps\Startup\Startup.r02 infected with Trojan.SymbOS.RommWar.a
Z:\System\Apps\Startup\Startup.app infected with Trojan.SymbOS.RommWar.a

I also trying this one on my other phone and i haven't knew that malware.
A malware infect a ROM area?
I think that alarm Antivirus is just a false alarm.
You must have installed KAV_Mobile_s602nd_v_6_0_80_en.sis on your phone.

MGDropper.A


MGDropper is a malicious SIS file dropper, that disables most well known third party file managers and Anti-Virus software and installs Cabir.G worm on the phone.
The Cabir.G is started automatically when the MGDropper is installed and will start spreading. When Cabir.G spreads from MGDropper infected phone, the SIS files it sends will contain only the Cabir.G not MGDropper. However the MGDropper also installs the Cabir.G into different directory as SEXXXY.SIS, which also disables phone menu application.
MGDropper tries to disable F-Secure Mobile Anti-Virus by replacing it's files with non-functional versions. However as F-Secure Mobile Anti-Virus is capable of detecting Cabir.G contained by MGDropper using generic detection. The Anti-Virus will detect the infected SIS file and prevent it from being installed. Provided that the Anti-Virus is in realtime scan mode as it is by default.
The Cabir.G worm dropped by MGDropper is already detected with generic detection as Cabir.Gen. So the MGDropper is already detected and stopped without need for updated Anti-Virus database.
Where is ?

Code:
C:\System\Apps\Antivirus\Antivirus.app
C:\System\Apps\Anti-Virus\Anti-Virus.app
C:\System\Apps\Anti-Virus\FsVUpdater.app
C:\System\Apps\AppInst\Appinst.aif
C:\System\Apps\AppInst\Appinst.app
C:\System\Apps\cabirfix\cabirfix.app
C:\System\Apps\Decabir\DECABIR.APP
C:\System\Apps\Disinfect\Disinfect.app
C:\System\Apps\FExplorer\FExplorer.app
C:\System\Apps\file\file.app
C:\System\Apps\OIDI500\OIDI500.aif
C:\System\Apps\OIDI500\OIDI500.mdl
C:\System\Apps\OIDI500\OIDI500.rsc
C:\System\Apps\smarfileman\smartfileman.app
C:\System\Apps\SystemExplorer\SystemExplorer.app
C:\System\SYMBIANSECUREDATA\CARIBESECURITYMANAGER\METALG.SIS
E:\System\Apps\Antivirus\Antivirus.app
E:\System\Apps\Anti-Virus\Anti-Virus.app
E:\System\Apps\Anti-Virus\FsVUpdater.app
E:\System\Apps\AppInst\Appinst.aif
E:\System\Apps\AppInst\Appinst.app
E:\System\Apps\cabirfix\cabirfix.app
E:\System\Apps\Decabir\DECABIR.APP
E:\System\Apps\Disinfect\Disinfect.app
E:\System\Apps\FExplorer\FExplorer.app
E:\System\Apps\file\file.app
E:\System\Apps\smarfileman\smartfileman.app
E:\System\Apps\SystemExplorer\SystemExplorer.app


When installed MGDropper will replace most common third party file managers, Anti-Virus programs and application installer with non-functional versions.


Payload Disables following applications


Simworks Anti-Virus
F-Secure Mobile Anti-Virus
Application installer
Cabirfix
Decabir
F-Cabir
FExplorer
File manager
Smart file manager
System Explorer


Code:

 For full disinfection of MGDropper you need help of another Series 60 phone that is not infected with the trojan, and clean memory card on that phone.

Onehop.A
Onehop.A is a Symbian SIS file trojan that causes device to reboot when trying to use system applications and sends copies to SymbOS/Bootton.A trojan to first device it finds with bluetooth.
In its structure Onehop.A is quite similar to Skulls family trojans. With the exception that instead of replacing system files with corrupted binaries,the Onehop.A uses application that causes device to reboot.
Thus if a device is infected with Onehop.A, pressing menu button or any system application button the device immediately reboots.
Onehop.A disables most of critical system functions and third party file managers, so that even if the device wouldn't immediately reboot it is still unusable before it is disinfected.
In addition of disabling applications on the phone, uses a modified version of cabir as distribution component for SymbOS/Bootton.A. So that first phone that is found over bluetooth receives Bootton.A over bluetooth if the user accepts connection. The modified Cabir that Onehop.A infects the device with is incapable of spreading, so it is detected as component of Onehop.A not as separate malware.
Like Skulls.A the Onehop.A replaces the application icons with it's own icon, this time the icon is a heart icon with the text "I-Love-U"
Where is ?

Code:
C:\system\apps\Appctrl\Appctrl.aif
C:\system\apps\Appctrl\Appctrl.app
C:\system\apps\Appinst\Appinst.aif
C:\system\apps\Appinst\Appinst.app
C:\system\apps\Appmngr\Appmngr.aif
C:\system\apps\Appmngr\Appmngr.app
C:\system\apps\BtUi\BtUi.app
C:\system\apps\BtUi\BtUi.aif
C:\system\apps\Camcorder\Camcorder.app
C:\system\apps\Camcorder\Camcorder.app
C:\system\apps\Camera\Camera.app
C:\system\apps\Camera\Camera.aif
C:\system\apps\efileman\efileman.app
C:\system\apps\efileman\efileman.aif
C:\system\apps\FExplorer\FExplorer.app
C:\system\apps\FExplorer\FExplorer.aif
C:\system\apps\File\File.app
C:\system\apps\File\File.aif
C:\system\apps\FileManager\FileManager.app
C:\system\apps\FileManager\FileManager.aif
C:\system\apps\ILoveU\ILoveU.APP
C:\system\apps\ILoveU\ILoveU.aif
C:\system\apps\ILoveU\ILoveU.RSC
C:\system\apps\ILoveU\ILU.mdl
C:\system\apps\IrApp\IrApp.app
C:\system\apps\IrApp\IrApp.aif
C:\system\apps\Logs\Logs.app
C:\system\apps\Logs\Logs.aif
C:\system\apps\mce\mce.app
C:\system\apps\mce\mce.aif
C:\system\apps\MediaGallery\MediaGallery.app
C:\system\apps\MediaGallery\MediaGallery.app
C:\system\apps\Menu\Menu.app
C:\system\apps\Menu\Menu.aif
C:\system\apps\Phone\Phone.app
C:\system\apps\Phone\Phone.aif
C:\system\apps\Phonebook\Phonebook.app
C:\system\apps\Phonebook\Phonebook.aif
C:\system\apps\SymCommander\SymCommander.app
C:\system\apps\SymCommander\SymCommander.aif
C:\system\apps\SystemExplorer\SystemExplorer.app
C:\system\apps\SystemExplorer\SystemExplorer.aif
C:\system\apps\ThNdRbRd.gif
C:\system\RECOGS\ILU.mdl
C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\Dont4get2readme.txt
C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ILoveU.APP
C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ILoveU.RSC
C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ILoveU.sis



Then, if i open that Dont4get2readme.txt and ThNdRbRd.gif is :

Code:
Saying HELLO From Here (SYRIA)
TO All The WORLD !!!

I Wish U N-Joy UR
Damaged Device ..

U Know, Not all may Read These Words But,
No Problem Bcuz Some will,

But even This, Thats The Way I Love U All ...

;-)


Regards,
ThNdRbRd
the picture is :



In Additional, i have extracted that C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ ILoveU.sis and there is a same extracted files with that malware Onehop.A except on folder C:\system\ThNdRbRdMainFiles\ThNdRbRdSecuritySystm\ Just one file following it.
I think the creator just remixed these files from another malware, just recollect it. Then he repack it to one SIS files and included his own Signature

Skuller.A

This Trojan program infects mobile phones running Symbian. Any mobile running Symbian is potentially vulnerable.
The Trojan itself is an SIS file, usually called 'extendedtheme.sis', although it may have a different name. The file is 1,192,117 bytes in size.
The Trojan was distributed via a range of mobile phone forums. It was presented as a program with new icons, new wallpaper etc.
During installation, the Trojan creates the following information and application files:

Code:
?:\System\Apps\About\About.app
?:\System\Apps\About\About.aif
?:\System\Apps\AppInst\AppInst.app
?:\System\Apps\AppInst\AppInst.aif
?:\System\Apps\AppMngr\AppMngr.app
?:\System\Apps\AppMngr\AppMngr.aif
?:\System\Apps\Autolock\Autolock.app
?:\System\Apps\Autolock\Autolock.aif
?:\System\Apps\Browser\Browser.app
?:\System\Apps\Browser\Browser.aif
?:\System\Apps\BtUi\BtUi.app
?:\System\Apps\BtUi\BtUi.aif
?:\System\Apps\bva\bva.app
?:\System\Apps\bva\bva.aif
?:\System\Apps\Calcsoft\Calcsoft.app
?:\System\Apps\Calcsoft\Calcsoft.aif
?:\System\Apps\Calendar\Calendar.app
?:\System\Apps\Calendar\Calendar.aif
?:\System\Apps\Camcorder\Camcorder.app
?:\System\Apps\Camcorder\Camcorder.aif
?:\System\Apps\CbsUiApp\CbsUiApp.app
?:\System\Apps\CbsUiApp\CbsUiApp.aif
?:\System\Apps\CERTSAVER\CERTSAVER.app
?:\System\Apps\CERTSAVER\CERTSAVER.aif
?:\System\Apps\Chat\Chat.app
?:\System\Apps\Chat\Chat.aif
?:\System\Apps\ClockApp\ClockApp.app
?:\System\Apps\ClockApp\ClockApp.aif
?:\System\Apps\CodViewer\CodViewer.app
?:\System\Apps\CodViewer\CodViewer.aif
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.app
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.aif
?:\System\Apps\Converter\Converter.app
?:\System\Apps\Converter\Converter.aif
?:\System\Apps\cshelp\cshelp.app
?:\System\Apps\cshelp\cshelp.aif
?:\System\Apps\DdViewer\DdViewer.app
?:\System\Apps\DdViewer\DdViewer.aif
?:\System\Apps\Dictionary\Dictionary.app
?:\System\Apps\Dictionary\Dictionary.aif
?:\System\Apps\FileManager\FileManager.app
?:\System\Apps\FileManager\FileManager.aif
?:\System\Apps\GS\GS.app
?:\System\Apps\GS\GS.aif
?:\System\Apps\ImageViewer\ImageViewer.app
?:\System\Apps\ImageViewer\ImageViewer.aif
?:\System\Apps\location\location.app
?:\System\Apps\location\location.aif
?:\System\Apps\Logs\Logs.app
?:\System\Apps\Logs\Logs.aif
?:\System\Apps\mce\mce.app
?:\System\Apps\mce\mce.aif
?:\System\Apps\MediaGallery\MediaGallery.app
?:\System\Apps\MediaGallery\MediaGallery.aif
?:\System\Apps\MediaPlayer\MediaPlayer.app
?:\System\Apps\MediaPlayer\MediaPlayer.aif
?:\System\Apps\MediaSettings\MediaSettings.app
?:\System\Apps\MediaSettings\MediaSettings.aif
?:\System\Apps\Menu\Menu.app
?:\System\Apps\Menu\Menu.aif
?:\System\Apps\mmcapp\mmcapp.app
?:\System\Apps\mmcapp\mmcapp.aif
?:\System\Apps\MMM\MMM.app
?:\System\Apps\MMM\MMM.aif
?:\System\Apps\MmsEditor\MmsEditor.app
?:\System\Apps\MmsEditor\MmsEditor.aif
?:\System\Apps\MmsViewer\MmsViewer.app
?:\System\Apps\MmsViewer\MmsViewer.aif
?:\System\Apps\MsgMailEditor\MsgMailEditor.app
?:\System\Apps\MsgMailEditor\MsgMailEditor.aif
?:\System\Apps\MsgMailViewer\MsgMailViewer.app
?:\System\Apps\MsgMailViewer\MsgMailViewer.aif
?:\System\Apps\MusicPlayer\MusicPlayer.app
?:\System\Apps\MusicPlayer\MusicPlayer.aif
?:\System\Apps\Notepad\Notepad.app
?:\System\Apps\Notepad\Notepad.aif
?:\System\Apps\NpdViewer\NpdViewer.app
?:\System\Apps\NpdViewer\NpdViewer.aif
?:\System\Apps\NSmlDMSync\NSmlDMSync.app
?:\System\Apps\NSmlDMSync\NSmlDMSync.aif
?:\System\Apps\NSmlDSSync\NSmlDSSync.app
?:\System\Apps\NSmlDSSync\NSmlDSSync.aif
?:\System\Apps\Phone\Phone.app
?:\System\Apps\Phone\Phone.aif
?:\System\Apps\Phonebook\Phonebook.app
?:\System\Apps\Phonebook\Phonebook.aif
?:\System\Apps\Pinboard\Pinboard.app
?:\System\Apps\Pinboard\Pinboard.aif
?:\System\Apps\PRESENCE\PRESENCE.app
?:\System\Apps\PRESENCE\PRESENCE.aif
?:\System\Apps\ProfileApp\ProfileApp.app
?:\System\Apps\ProfileApp\ProfileApp.aif
?:\System\Apps\ProvisioningCx\ProvisioningCx.app
?:\System\Apps\ProvisioningCx\ProvisioningCx.aif
?:\System\Apps\PSLN\PSLN.app
?:\System\Apps\PSLN\PSLN.aif
?:\System\Apps\PushViewer\PushViewer.app
?:\System\Apps\PushViewer\PushViewer.aif
?:\System\Apps\Satui\Satui.app
?:\System\Apps\Satui\Satui.aif
?:\System\Apps\SchemeApp\SchemeApp.app
?:\System\Apps\SchemeApp\SchemeApp.aif
?:\System\Apps\ScreenSaver\ScreenSaver.app
?:\System\Apps\ScreenSaver\ScreenSaver.aif
?:\System\Apps\Sdn\Sdn.app
?:\System\Apps\Sdn\Sdn.aif
?:\System\Apps\SimDirectory\SimDirectory.app
?:\System\Apps\SimDirectory\SimDirectory.aif
?:\System\Apps\SmsEditor\SmsEditor.app
?:\System\Apps\SmsEditor\SmsEditor.aif
?:\System\Apps\SmsViewer\SmsViewer.app
?:\System\Apps\SmsViewer\SmsViewer.aif
?:\System\Apps\Speeddial\Speeddial.app
?:\System\Apps\Speeddial\Speeddial.aif
?:\System\Apps\Startup\Startup.app
?:\System\Apps\Startup\Startup.aif
?:\System\Apps\SysAp\SysAp.app
?:\System\Apps\SysAp\SysAp.aif
?:\System\Apps\ToDo\ToDo.app
?:\System\Apps\ToDo\ToDo.aif
?:\System\Apps\Ussd\Ussd.app
?:\System\Apps\Ussd\Ussd.aif
?:\System\Apps\VCommand\VCommand.app
?:\System\Apps\VCommand\VCommand.aif
?:\System\Apps\Vm\Vm.app
?:\System\Apps\Vm\Vm.aif
?:\System\Apps\Voicerecorder\Voicerecorder.app
?:\System\Apps\Voicerecorder\Voicerecorder.aif
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.app
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.aif
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.app
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.aif
______________________________________
?:\System\Libs\licencemanager20s.dll
?:\System\Libs\softwarecopier200.dll
?:\System\Libs\ZLIB.DLL
?:\System\Libs\notification.cmd
?:\System\Libs\lmpro.r01
?:\System\Libs\lmpro.r02



The application files created by the Trojan program are standard application files for the Symbian platform and do not contain any malicious code. The .aif files, however, are malicious; these create skull icons and block access to the application for which the skulls act as an icon.






All the
applications on the telephone will cease to function. Once a telephone has been infected it can only be used to make calls; SMS, MMS, camera, organiser functions etc. will no longer work.

Skuller.B
Code:
?:\System\Apps\About\About.app
?:\System\Apps\About\About.aif
?:\System\Apps\AppInst\AppInst.app
?:\System\Apps\AppInst\AppInst.aif
?:\System\Apps\AppMngr\AppMngr.app
?:\System\Apps\AppMngr\AppMngr.aif
?:\System\Apps\Autolock\Autolock.app
?:\System\Apps\Autolock\Autolock.aif
?:\System\Apps\Browser\Browser.app
?:\System\Apps\Browser\Browser.aif
?:\System\Apps\BtUi\BtUi.app
?:\System\Apps\BtUi\BtUi.aif
?:\System\Apps\bva\bva.app
?:\System\Apps\bva\bva.aif
?:\System\Apps\Calcsoft\Calcsoft.app
?:\System\Apps\Calcsoft\Calcsoft.aif
?:\System\Apps\Calendar\Calendar.app
?:\System\Apps\Calendar\Calendar.aif
?:\System\Apps\Camcorder\Camcorder.app
?:\System\Apps\Camcorder\Camcorder.aif
?:\System\Apps\CbsUiApp\CbsUiApp.app
?:\System\Apps\CbsUiApp\CbsUiApp.aif
?:\System\Apps\CERTSAVER\CERTSAVER.app
?:\System\Apps\CERTSAVER\CERTSAVER.aif
?:\System\Apps\Chat\Chat.app
?:\System\Apps\Chat\Chat.aif
?:\System\Apps\ClockApp\ClockApp.app
?:\System\Apps\ClockApp\ClockApp.aif
?:\System\Apps\CodViewer\CodViewer.app
?:\System\Apps\CodViewer\CodViewer.aif
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.app
?:\System\Apps\ConnectionMonitorUi\ConnectionMonitorUi.aif
?:\System\Apps\Converter\Converter.app
?:\System\Apps\Converter\Converter.aif
?:\System\Apps\cshelp\cshelp.app
?:\System\Apps\cshelp\cshelp.aif
?:\System\Apps\DdViewer\DdViewer.app
?:\System\Apps\DdViewer\DdViewer.aif
?:\System\Apps\Dictionary\Dictionary.app
?:\System\Apps\Dictionary\Dictionary.aif
?:\System\Apps\FileManager\FileManager.app
?:\System\Apps\FileManager\FileManager.aif
?:\System\Apps\GS\GS.app
?:\System\Apps\GS\GS.aif
?:\System\Apps\ImageViewer\ImageViewer.app
?:\System\Apps\ImageViewer\ImageViewer.aif
?:\System\Apps\location\location.app
?:\System\Apps\location\location.aif
?:\System\Apps\Logs\Logs.app
?:\System\Apps\Logs\Logs.aif
?:\System\Apps\mce\mce.app
?:\System\Apps\mce\mce.aif
?:\System\Apps\MediaGallery\MediaGallery.app
?:\System\Apps\MediaGallery\MediaGallery.aif
?:\System\Apps\MediaPlayer\MediaPlayer.app
?:\System\Apps\MediaPlayer\MediaPlayer.aif
?:\System\Apps\MediaSettings\MediaSettings.app
?:\System\Apps\MediaSettings\MediaSettings.aif
?:\System\Apps\Menu\Menu.app
?:\System\Apps\Menu\Menu.aif
?:\System\Apps\mmcapp\mmcapp.app
?:\System\Apps\mmcapp\mmcapp.aif
?:\System\Apps\MMM\MMM.app
?:\System\Apps\MMM\MMM.aif
?:\System\Apps\MmsEditor\MmsEditor.app
?:\System\Apps\MmsEditor\MmsEditor.aif
?:\System\Apps\MmsViewer\MmsViewer.app
?:\System\Apps\MmsViewer\MmsViewer.aif
?:\System\Apps\MsgMailEditor\MsgMailEditor.app
?:\System\Apps\MsgMailEditor\MsgMailEditor.aif
?:\System\Apps\MsgMailViewer\MsgMailViewer.app
?:\System\Apps\MsgMailViewer\MsgMailViewer.aif
?:\System\Apps\MusicPlayer\MusicPlayer.app
?:\System\Apps\MusicPlayer\MusicPlayer.aif
?:\System\Apps\Notepad\Notepad.app
?:\System\Apps\Notepad\Notepad.aif
?:\System\Apps\NpdViewer\NpdViewer.app
?:\System\Apps\NpdViewer\NpdViewer.aif
?:\System\Apps\NSmlDMSync\NSmlDMSync.app
?:\System\Apps\NSmlDMSync\NSmlDMSync.aif
?:\System\Apps\NSmlDSSync\NSmlDSSync.app
?:\System\Apps\NSmlDSSync\NSmlDSSync.aif
?:\System\Apps\Phone\Phone.app
?:\System\Apps\Phone\Phone.aif
?:\System\Apps\Phonebook\Phonebook.app
?:\System\Apps\Phonebook\Phonebook.aif
?:\System\Apps\Pinboard\Pinboard.app
?:\System\Apps\Pinboard\Pinboard.aif
?:\System\Apps\PRESENCE\PRESENCE.app
?:\System\Apps\PRESENCE\PRESENCE.aif
?:\System\Apps\ProfileApp\ProfileApp.app
?:\System\Apps\ProfileApp\ProfileApp.aif
?:\System\Apps\ProvisioningCx\ProvisioningCx.app
?:\System\Apps\ProvisioningCx\ProvisioningCx.aif
?:\System\Apps\PSLN\PSLN.app
?:\System\Apps\PSLN\PSLN.aif
?:\System\Apps\PushViewer\PushViewer.app
?:\System\Apps\PushViewer\PushViewer.aif
?:\System\Apps\Satui\Satui.app
?:\System\Apps\Satui\Satui.aif
?:\System\Apps\SchemeApp\SchemeApp.app
?:\System\Apps\SchemeApp\SchemeApp.aif
?:\System\Apps\ScreenSaver\ScreenSaver.app
?:\System\Apps\ScreenSaver\ScreenSaver.aif
?:\System\Apps\Sdn\Sdn.app
?:\System\Apps\Sdn\Sdn.aif
?:\System\Apps\SimDirectory\SimDirectory.app
?:\System\Apps\SimDirectory\SimDirectory.aif
?:\System\Apps\SmsEditor\SmsEditor.app
?:\System\Apps\SmsEditor\SmsEditor.aif
?:\System\Apps\SmsViewer\SmsViewer.app
?:\System\Apps\SmsViewer\SmsViewer.aif
?:\System\Apps\Speeddial\Speeddial.app
?:\System\Apps\Speeddial\Speeddial.aif
?:\System\Apps\Startup\Startup.app
?:\System\Apps\Startup\Startup.aif
?:\System\Apps\SysAp\SysAp.app
?:\System\Apps\SysAp\SysAp.aif
?:\System\Apps\ToDo\ToDo.app
?:\System\Apps\ToDo\ToDo.aif
?:\System\Apps\Ussd\Ussd.app
?:\System\Apps\Ussd\Ussd.aif
?:\System\Apps\VCommand\VCommand.app
?:\System\Apps\VCommand\VCommand.aif
?:\System\Apps\Vm\Vm.app
?:\System\Apps\Vm\Vm.aif
?:\System\Apps\Voicerecorder\Voicerecorder.app
?:\System\Apps\Voicerecorder\Voicerecorder.aif
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.app
?:\System\Apps\WALLETAVMGMT\WALLETAVMGMT.aif
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.app
?:\System\Apps\WALLETAVOTA\WALLETAVOTA.aif
__________________________________________
?:\System\CARIBESECURITYMANAGER\caribe.app
?:\System\CARIBESECURITYMANAGER\caribe.rsc
?:\System\CARIBESECURITYMANAGER\CAMTIMER.sis
__________________________________________
?:\System\RECOGS\flo.mdl
This skuller is same as Skuller.A but some differents on System\Libs and System\CARIBESECURITYMANAGER, then this virus also include flo.mdl on System\Recogs.


Skuller.D
Code:
?:\System\Apps\Appctrl\Appctrl.app
?:\System\Apps\Appctrl\Appctrl.aif
?:\System\Apps\BtUi\BtUi.app
?:\System\Apps\BtUi\BtUi.aif
?:\System\Apps\efileman\efileman.app
?:\System\Apps\efileman\efileman.aif
?:\System\Apps\FExplorer\FExplorer.app
?:\System\Apps\FExplorer\FExplorer.aif
?:\System\Apps\File\File.app
?:\System\Apps\File\File.aif
?:\System\Apps\FileManager\FileManager.app
?:\System\Apps\FileManager\FileManager.aif
?:\System\Apps\FileView\FileView.app
?:\System\Apps\FileView\FileView.aif
?:\System\Apps\Mariya\Mariya.app
?:\System\Apps\Mariya\Mariya.mdl
?:\System\Apps\Mariya\Mariya.rsc
?:\System\Apps\MediaGallery\MediaGallery.app
?:\System\Apps\MediaGallery\MediaGallery.aif
?:\System\Apps\mmcapp\mmcapp.app
?:\System\Apps\mmcapp\mmcapp.aif
?:\System\Apps\Phone\Phone.app
?:\System\Apps\Phone\Phone.aif
?:\System\Apps\Phonebook\Phonebook.app
?:\System\Apps\Phonebook\Phonebook.aif
?:\System\Apps\ProfileApp\ProfileApp.app
?:\System\Apps\ProfileApp\ProfileApp.aif
?:\System\Apps\SmartFileMan\SmartFileMan.app
?:\System\Apps\SmartFileMan\SmartFileMan.aif
?:\System\Apps\Startup\Startup.app
?:\System\Apps\Startup\Startup.aif
?:\System\Apps\SystemExplorer\SystemExplorer.app
?:\System\Apps\SystemExplorer\SystemExplorer.aif
?:\System\Apps\ThNdRbRd\ThNdRbRd.app
?:\System\Apps\ThNdRbRd\ThNdRbRd.aif
?:\System\Apps\Voicerecorder\Voicerecorder.app
?:\System\Apps\Voicerecorder\Voicerecorder.aif
____________________________________
?:\System\data\Backgroundimage.mbm
____________________________________
?:\System\Nawrasxsecuredata\NawraSSECURITYMANAGER\Mariya.app
?:\System\Nawrasxsecuredata\NawraSSECURITYMANAGER\Mariya.rsc
?:\System\Nawrasxsecuredata\NawraSSECURITYMANAGER\Mariya.sis
____________________________________
?:\System\Recogs\Naw.mdl
Effect is same as both, but this one also show us the Background display on main screen with this file C:\System\data\Backgroundimage.mbm.
if we shot on Menu, just like this :




full file download Mobile Virus Analyze.doc

http://ajitkathat.110mb.com/Virus%20Mobile%20Analyze.doc