Virus Alert for Symbian: Trojan SymbOS/Spitmo.A Circulating In The Wild!

F-Secure Investigates New Mobile Worm

Security researchers over at F-Secure are warning Nokia Smartphone users of a newly discovered mobile malware identified as ‘Spitmo’ aimed at Symbian based devices.

This variant of SpyEye has been used in an attack against a European bank. The bank uses SMS based mTANs to authorize transfers.
The trojan injects fields into the bank’s webpage and asks the customer to input his mobile phone number and the IMEI of the phone.
The bank customer is then told the information is needed so a “certificate” can be sent to the phone and is informed that it can take up to three days before the certificate is ready.
Detection for this (and other SpyEye variants made with the same kit) is Trojan-Spy:W32/Spyeye.AG.
The so-called certificate, the Symbian component of the malware, is detected as Trojan:SymbOS/Spitmo.A.
Spitmo.A contains the malicious executable (sms.exe) and another installer which contains an executable named SmsControl.exe. SmsControl.exe will just display the message “Die Seriennummer des Zertifikats: 88689-1299F” to fool the user into thinking that the installer was indeed a certificate.
The name SmsControl.exe is quite a co-incidence as a variant of ZeusMitmo used the same filename for the file containing the actual trojan. Faking the trojan to be a certificate is also a trick that ZeusMitmo has used. However, the code itself looks completely different than in ZeusMitmo. Full details of how the SMS based mTANs are delivered to the attacker are still under investigation, but it looks as if they are delivered via HTTP and not by SMS as with ZeusMitmo.

The trojan is signed with a developer certificate. Developer certificates are tied to certain IMEIs and can only be installed to phones that have an IMEI that is listed in the certificate. This is why the malware author(s) request the IMEI in addition to the phone number on the bank’s website.
Once they receive new IMEIs, they request an updated certificate with IMEIs for all victims and create a new installer signed with the updated certificate. A possible source for the certificate is OPDA (, as searching for the unusually long organization name (“Beijing shi ji yi jia wang dian zi shang wu you xian gong si”) returns hits related to OPDA. The delay in getting the new certificate explains why the SpyEye-injected message states it can take up to three days for the certificate to be delivered. 
Trojan contents:

  •  c:\Private\E13D4ECD\settings.dat — contains two URLs http://[*].net/input.php and  
  •  c:\Data\delete.sis — sms.exe contains code to silently install other applications
  •  c:\Private\E13D4ECD\first.dat — an empty file, deleted by sms.exe if present, used as
      execution check
  •  c:\sys\bin\Sms.exe — payload, executed after installation
  • c:\private\101f875a\import\[E13D4ECD].rsc — runs sms.exe when the phone is turned

Embedded installer SmsControl.sis:

  •  c:\resource\apps\SmsControl.r01
  •  c:\private\10003a3f\import\apps\SmsControl_reg.r01
  •  c:\resource\apps\SmsControl_aif.mif
  •  c:\Private\EAF7F915\data.txt — contains the message displayed to the user
  •  c:\sys\bin\SmsControl.exe — executed after installation, displays decoy message

via [Symbian-Freak]