Skip Over Navigation Links
Center for Information TechnologyAntivirus
Antivirus Home Page
Contact Us
Questions or Comments
Disclaimers

Software
Current client downloads:
 VScan Engine/Dat (SuperDat) -5300/2777.5511
 VirusScan Enterprise 8.5i (with Patch 6) - Windows NT/2000/XP/2003
 VirusScan Enterprise 7.1 - Windows NT/2000/XP/2003
 Virex (OS X) Engine/Def - 7.2(v1.1)/081029
 Virex (OS 9.x) Engine/Def - 6.2/071001
 Linux & Solaris Engine/Dat - 5.2.00/4.0.5196
 Symantec Antivirus - 10.1.7.7000
 Symantec Antivirus - 10.2
 Clean Boot 1.0
 Stinger v3.8.0 virus removal tool (Updated 09/10/07)
Current server downloads:
 VirusScan Enterprise 8.5
 VirusScan Enterprise 7.1
 NetShield NetWare - 4.6.2
 NetShield NetWare - 4.6.3
 NetShield NetWare Engine Update - 4.4.00
 ePO agent for NetWare
 ScanMail eManager - 3.0

Information
 ePO 3.0/VirusScan 7.0 Presentation
 Virex 7.x Installation Instructions
 VirusScan FAQs
 VirusScan Instructions
 Additional Resources

Archives
 List of Viruses

Virus Archives

Virus Advisory - W32.Sircam Last Updated 7/24/01

On 7/18/01, NAI reported a new virus W32.Sircam had been found in the wild.
The virus arrives as an email attachment to a message with:

Subject: random file name
Attachment: random file name

The body of the message includes the text:

Hi! How are you?
I send you this file in order to have your advice
See you later. Thanks

The message may also include the text:
I hope you can help me with this file that I send
or I hope you like the file that I send to you
or This is the file with the information that you ask for

When the attachment is executed the virus is saved to C:\RECYCLED\SirC32.exe. The virus also copies itself to C:\WINDOWS\SYSTEM\SCam32.exe. The virus gathers file names with the extensions .GIF, .JPG, .JPEG, .MPEG, .MOV, .MPG, .PDF, .PNG, .PS, and .ZIP from the infected machine saving them to the file SCD.DLL (the 2nd character of the name appears to be random) in the SYSTEM directory. The virus gathers email addresses from Outlook and temporary Internet cached pages storing them in SCD1.DLL (the 2nd and 3rd character of the name appears to be random) in the SYSTEM directory. Using the file names gathered in the SCD.DLL file the virus sends itself out to all addresses listed in the SCD1.DLL file adding .BAT, .COM, .EXE, .LNK, .PIF to the end of the attachment. The virus uses a built-in SMTP server to replicate.

For more information see:

This archive is not intended to be comprehensive. For a more complete virus library, please visit NAI's Virus Information Library at http://vil.nai.com.

Contact NIH Help Desk for assistance:
866-319-4357 (toll free), 301-496-4357 (6-HELP) (local), 301-496-8294 (TDD)
http://ithelpdesk.nih.gov/support
Register for iForgotMyPassWord

National Institutes of HealthCenter for Information Technology
National Institutes of Health
Bethesda, Maryland 20892

Questions or Comments | Disclaimers | Privacy Policy

Department of Health and Human ServicesHealth and Human Services
Washington, D.C. 20201
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -