Threat Description



Category: Malware
Platform: W32
Aliases: Melare, I-Worm.Melare, W32/Melare@MM


This is the worm virus spreading via the Internet being attached to infected emails. The worm itself is Windows PE EXE file about 6Kb of length (compressed by UPX, decompressed size - about 15Kb), written in Visual Basic.


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

The worm activates from infected email only in case a user clicks on attached file. Note that the real attached .EXE file name is hidden by fake .JPG name (the "extra functionality" of MS Outlook is used for that). As a result the infected .EXE file is displayed as .JPG image file (picture), but on opening this attach it is executed as true EXE file. Starting from MS Outlook 97 SP2 such kind of attached files are blocked (in default mode).

The worm then installs itself to the system, runs spreading routine and payload.


While installing the worm copies itself to Windows directory with the "csrss.EXE" name and registers that file in system registry auto-run key:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run    SystemSARS32 = %WindowsDir%\csrss.EXE        

To send infected messages the worm uses MS Outlook and sends messages to all addresses found in Outlook address book.

The infected messages have:

 Subject:  Alert! SARS Is being Spread!  Body:     Hi!, This is a beta test SARS. Please check an attachment!  Attach:   sars_image.jpg    

The beginning of message body text may be covered by "JPG attach" icon.


On 1st, 4th, 8th, 12th, 16th, 20th, 24th and 28th of each month the worm deletes all *.DLL, *.NLS, *.OCX files in current directory (in most cases - Windows directory).


F-Secure Anti-Virus detects Melare worm with generic detection and heuristic.

Description Details: Kaspersky Lab, 19th of May 2003


Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More