This worm may be downloaded from remote sites or dropped by other malware.
It drops copies of itself in all physical and removable drives.
It opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the remote user executes commands on the affected system.
It uses the following icon similar to a legitimate application to entice users into clicking it.
It connects to a possibly malicious URL. However the said URL is inaccessible as of this writing.
More...