This backdoor may be dropped by other malware. It may be downloaded unknowingly by a user when visiting malicious Web sites.
It drops a copy of itself.
It registers itself as a system service to ensure its automatic execution at every system startup. It does this by creating a registry entry.
This backdoor opens random ports. It listens for a connection from another remote system. Once connected, it enables a remote malicious user to issue commands on the affected system. These commands include hooking keyboard inputs, downloading further malicious files, launching denial of service (DoS) attacks, executing files, and stealing system information. As a result, system security may be compromised.
More...