Home / malware Worm:SymbOS/Mabir.A
First posted on 16 July 2010.
Source: SecurityHomeAliases :
There are no other names known for Worm:SymbOS/Mabir.A.
Explanation :
A standalone malicious program which uses computer or network resources to make complete copies of itself. May include code or other malware to damage both the system and the network.
Additional DetailsWorm:SymbOS/Mabir.A is a worm that infects devices running the Symbian Series 60 operating system. Mabir.A is capable of spreading in an infected symbian Installation (SIS) file over both Bluetooth and MMS.
The SIS file that Mabir.A sends use the file name "caribe.sis". Please note that though Mabir.A uses the same SIS file name as Cabir worms, it is actually different worm.
Infection
On receiving the transmitted SIS file, it is automatically installed.
During installation, the installer will copy the worm executables into following locations:
€ \system\apps\Caribe\Caribe.app € \system\apps\Caribe\Caribe.rsc € \system\apps\Caribe\flo.mdl
When the Mabir.exe is executed it copies the following files:
€ \system\symbiansecuredata\caribesecuritymanager\Caribe.app € \system\symbiansecuredata\caribesecuritymanager\Caribe.rsc
And rebuilds its SIS file to:
€ \system\symbiansecuredata\caribesecuritymanager\Info.sis
Replication (Bluetooth)
When Mabir worm is activated on an infected device, it uses the native Bluetooth functionality to start looking for other discoverable Bluetooth-enabled devices. If found, it transmits an infected SIS file to the targetted device. If the target goes out of range or rejects file transfer, Mabir will continue trying to communicate with the same device.
The infected SIS file is always named caribe.sis. To be infected, a user must selected 'Yes' when prompted to do so.
The file contains the worm component files caribe.app, caribe.rsc and flo.mdl. It also contains autostart settings that will automatically execute caribe.app after the SIS file is being installed, thus starting the worm.
Replication (MMS)
MMS messages are multimedia messages that are intended to contain only media content, such as pictures, audio or video, but can also be used to transmit infected Symbian installation files.
The MMS sending is triggered by MMS or SMS message that arrives to the phone, causing Mabir to send itself as MMS message to the number from which the message arrived from. Thus the Mabir tries to fool the receiver that it has been sent as reply to the message that user sent to the infected phone.
The Mabir worm does not use any texts in the MMS messages it sends.
When the recipient opens the MMS message containing the infected SIS file, the action automatically executes the file and causes it to install.
Last update 16 July 2010