Detailed Description Replication over Bluetooth
When Commwarrior.Q has infected a phone it will search for other phones that are visible over bluetooth and try to send itself as a SIS installation package to the target phone. The Commwarrior.Q installation package has a name that is just random text. For example, anyrah5y.sis or xyr88b0muh7.sis. The application name that is shown to the user is generated from an internal list of strings, so it looks like a normal application install. The SIS file also has a random size between 32100 and 32200 bytes.
Installation
When the Commwarrior.Q SIS file is installed, it will drop the Commwarrior.Q executable with a random name either into C:\ or to a direcotory that has a random name such as C:\uqxo5dh7xtyc5. When the SIS file executes, Commwarrior.Q it will recreate itself into C:\System\libs\cw3.exe and create a bootstrap into C:\System\recogs\cw3rec.mdl.
Displaying HTML Page
After Commwarrior.Q has infected the phone it will, after a random delay, create an HTML page that it will display itself to the user using the phone's default browser.
Replication to MMC Card
Commwarrior.Q "listens" for any MMC cards to be inserted into the infected phone, and copies itself to the inserted card. The infected card contains both the Commwarrior executable and the bootstrap component, so that if the infected card is inserted into another phone it will also be infected.
Replication by infecting other SIS files
Commwarrior.Q searches the device C: drive and memory cards for SIS installation files, and will infect all SIS files that it finds. The infected SIS files will be wrapped by Commwarrior.Q so that if the user installs the infected SIS file, Commwarrior.Q will install first followed by the original application.
Source