This worm may be dropped by other malware. It may arrive via network shares. It may be downloaded unknowingly by a user when visiting malicious Web sites.
It drops copies of itself. It drops files/components. It creates registry entries to enable its automatic execution at every system startup. It modifies registry key(s)/entry(ies) as part of its installation routine.
It drops copies of itself in specific drives.
It accesses Web sites to download file(s). As a result, malicious routines of the downloaded files are exhibited on the affected system.
More...