Classification

Category :

Malware

Type :

-

Aliases :

Melare, I-Worm.Melare, W32/Melare@MM

Summary

This is the worm virus spreading via the Internet being attached to infected emails. The worm itself is Windows PE EXE file about 6Kb of length (compressed by UPX, decompressed size - about 15Kb), written in Visual Basic.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The worm activates from infected email only in case a user clicks on attached file. Note that the real attached .EXE file name is hidden by fake .JPG name (the "extra functionality" of MS Outlook is used for that). As a result the infected .EXE file is displayed as .JPG image file (picture), but on opening this attach it is executed as true EXE file. Starting from MS Outlook 97 SP2 such kind of attached files are blocked (in default mode).

The worm then installs itself to the system, runs spreading routine and payload.

Installation

While installing the worm copies itself to Windows directory with the "csrss.EXE" name and registers that file in system registry auto-run key:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

SystemSARS32 = %WindowsDir%\csrss.EXE

Spreading

To send infected messages the worm uses MS Outlook and sends messages to all addresses found in Outlook address book.

The infected messages have:

 Subject:
Alert! SARS Is being Spread!
Body:

 Hi!, This is a beta test SARS. Please check an attachment!
Attach:
 sars_image.jpg

The beginning of message body text may be covered by "JPG attach" icon.

Payload

On 1st, 4th, 8th, 12th, 16th, 20th, 24th and 28th of each month the worm deletes all *.DLL, *.NLS, *.OCX files in current directory (in most cases - Windows directory).