Skip to content

Export page to PDF
SWF_PALEVO.KK
Malware type: Trojan
Destructive: No
Platform: Windows 98, ME, NT, 2000, XP, Server 2003
Encrypted: No
In the wild: Yes

Overview


This malware has received attention from independent media sources and/or other security firms.

To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.

This Trojan accesses a website to download a file that Trend Micro detects as WORM_PALEVO.KK.

It displays a fake image of a YouTube video.

This Trojan executes when a user accesses certain websites where it is hosted.

Technical Details


File size: 34,722 bytes
File type: SWF
Initial samples received date: 03 May 2010
Payload: Displays graphics/image, Downloads files

Arrival Details

This Trojan executes when a user accesses certain websites where it is hosted.

It may be downloaded from the following remote site(s):

  • http://www.{BLOCKED}com.com/tube.swf

Download Routine

This Trojan accesses the following websites to download files:

  • http://www.{BLOCKED}com.com/{BLOCKED}layer10.0.45.2.exe

Trend Micro detects the dowloaded file as:

  • WORM_PALEVO.KK

Other Details

This Trojan displays the following images:

Solution


Minimum scan engine: 8.900
VSAPI OPR Pattern Version: 7.151.00
VSAPI OPR Pattern Release Date: 07 May 2010

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by SWF_PALEVO.KK

Step 3

Close all opened browser windows

Step 4

Scan your computer with your Trend Micro product to delete files detected as SWF_PALEVO.KK. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.

Connect with us on