Analysis by: RomeoD


Windows 98, ME, NT, 2000, XP, Server 2003


  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes


This malware has received attention from independent media sources and/or other security firms.

To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.

This Trojan accesses a website to download a file that Trend Micro detects as WORM_PALEVO.KK.

It displays a fake image of a YouTube video.

This Trojan executes when a user accesses certain websites where it is hosted.


File Size: 34,722 bytes
File Type: SWF
Initial Samples Received Date: 03 May 2010
Payload: Displays graphics/image, Downloads files

Arrival Details

This Trojan executes when a user accesses certain websites where it is hosted.

It may be downloaded from the following remote site(s):

  • http://www.{BLOCKED}

Download Routine

This Trojan accesses the following websites to download files:

  • http://www.{BLOCKED}{BLOCKED}layer10.0.45.2.exe

Trend Micro detects the dowloaded file as:


Other Details

This Trojan displays the following images:


Minimum Scan Engine: 8.900
VSAPI OPR PATTERN File: 7.151.00
VSAPI OPR PATTERN Date: 07 May 2010

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by SWF_PALEVO.KK

Step 3

Close all opened browser windows

Step 4

Scan your computer with your Trend Micro product to delete files detected as SWF_PALEVO.KK. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

Did this description help? Tell us how we did.