Dear all
Thanks for the replies. Especial thanks to Satcomer - I had not heard of EtreCheck and have now included it in my collection of helpful stuff.
I overcame my problem by going to google for my mail services. We already had Google Apps for Education happening but had not decided to use their mail option until this happened.
So, some things to think about. I believe my attack was sophisticated in that the payload being relayed was organised to scrape under our filtering. The offending traffic was intranet based. The malware relied on the ability of the mail app to relay the mail. Individual users had no idea that their mail client was being used to relay mail unless they were using Avira which popped up when one of the offending mails included recognised malware.
As soon as any interest was shown in a machine, it was not longer used to relay. This was as simple as using the web mail client for a number of hours.
The hit list included some members of our domain but the addresses included people who had left many years ago. It looked as if the address were from the Adobe and LinkedIn data breaches.
I would love to know how they have the mail app working - this is on El Capitan and Yosemite computers.
Plus go to Apple - My Apple ID sign in and CHANGE your password immediately!