Analysis by: Erika Bianca Mendoza


Windows 2000, Windows XP, Windows Server 2003


  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes


Infection Channel: Propagates via social networking sites

This malware spreads via <i>Facebook</i>. It uses the news of Osama bin Laden's death, making it enticing for users.

To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.

This JavaScript posts messages on an affected user's Facebook profile in order to lure the user into clicking malicious links. It also posts chat messages to the affected user's contacts in order to propagate.

It may also redirect to a possibly malicious link.

This Trojan may be hosted on a website and run when a user accesses the said website.


File Size: 24,516 bytes
File Type: JS
Initial Samples Received Date: 02 May 2011
Payload: Connects to URLs/Ips, Displays message/message boxes

Arrival Details

This Trojan may be hosted on a website and run when a user accesses the said website.

This JavaScript posts messages in Facebook to lure the users into clicking malicious links. It may send a chat message to the affected Facebook user's friends with the following message:

  • {first name} watch the video of them killing osama bin laden live!{BLOCKED}Bin-Laden-Killed-Actual-Video/18557671149048
It may also post the messages below:
  • Osama Bin Laden killed live on a news broadcast! watch the video:{BLOCKED}Bin-Laden-Killed-Actual-Video/185576711490486
  • Top Osama Video Viewers:
    {name} - 1136 views
    {name} - 983 views
    {name} - 542 views
    {name} - 300 views
    See who views your profile{BLOCKED}Bin-Laden-Killed-Actual-Video/185576711490486
Alternatively, it may create an event with details such as:
    Hey everyone,
    Osama Bin Laden Killed Live On A News Broadcast!
    go here! -{BLOCKED}Bin-Laden-Killed-Actual-Video/185576711490486
  • Name: Osama dead video views: {random number}
    Description: Now You can see the live osama video @{BLOCKED}Bin-Laden-Killed-Actual-Video/185576711490486
When the user clicks the links in the messages posted, it displays the page below:
The page instructs the user to paste a script in the address bar. Once done, it executes another JavaScript that is also detected as JS_OBFUS.AB. This may also redirect to a possibly malicious link:
  • http://{BLOCKED}4.{BLOCKED}2.24.211/OsamaDead.php


Minimum Scan Engine: 8.900
VSAPI OPR PATTERN File: 8.135.00
VSAPI OPR PATTERN Date: 03 May 2011

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Scan your computer with your Trend Micro product to delete files detected as JS_OBFUS.AB. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

Did this description help? Tell us how we did.