Here's what I found at
Trend Micro
Aliases:
Anna Kournikova, KALAMAR.A,
VBS/Onthefly.A
Description:
Trend Micro has been receiving several customer phone calls
regarding the "Anna Kournikova" virus, a.k.a. VBS_KALAMAR.A.
This is a Visual Basic Script virus that is currently propagating by
email as an attachment "ANNAKOURNIKOVA.JPG.VBS."
Trend's pattern file #749 and scan engine 5.200 detects this virus.
Trend advises all customers to download the appropriate pattern file
and scan engine.
This web site will be updated as further information is received.
Solution:
Trend customers
Keep your pattern file and scan engine updated. Trend
Micro antivirus software can clean or remove most
types of viruses. Certain viruses, such as Trojans,
scripts, overwriting viruses and joke programs which
are identified as "uncleanable", should simply be
deleted.
All Internet users
1.For a quick check-up of your PC, use HouseCall - Trend
Micro's free on-line virus scanner. This will check for
viruses which may already be on your PC.
2.To keep your computer healthy by catching viruses before
they have a chance to infect your PC or network, get the best
antivirus solution available today. Trend Micro offers antivirus
and content security solutions for home users, corporate
users and ISPs.
Technical details
In the wild: Yes
Trigger date 1: January 26th
Payload 1: Others (tries to connect to a
computer store web site in Netherlands)
Detected by pattern file#: 749
Detected by scan engine#: 5.200
Language: English
Platform: Windows
Encrypted: Yes
Size of virus: ~2K Bytes
Details:
This Visual Basic Script virus is encrypted and appears to be a
variant of the VBSWG virus construction kit. It is a mass mailer and
spreads via Microsoft Outlook. A sample of the email is as follows:
Subject: Here you have, ;o)
Message Body: Hi:
Check This!
Attachment: AnnaKournikova.jpg.vbs
Warning: The subject line, message body as well as the
attachment filename may change. Trend advises all email users to
not open unsolicited attachments.
When the file attachment is executed, the worm copies itself to
the Windows folder and then sends itself to all entries in the
address book of the infected user.
If the current system date is January 26, the virus tries to connect
to a computer shop web site in Netherlands,
http://www.dynabyte.nl. This virus can also be found at the
UseNet, microsoft.public.opk.windows9x newsgroup.
The virus contains the comments:
'Vbs.OnTheFly Created By OnTheFly
and
'Vbswg 1.50b
Thorin