The worm consists of a traditional Trojan package which allows the controller to download files onto your server and your machine but rather bizarrely the code also generate hundreds of random domain names and asks your machine to search them for updates. This operation not only leaves your machine open to external influences but will also use massive system resources and grind your computer to a halt.
Security experts suggest blocking all incoming and outgoing traffic on “port 445” until the rogue code is identified and deleted. We should begin to see the infection rate slowdown as Microsoft issued a security patch for the identified vulnerability in October 2008. However, by the time this Microsoft update is executed it may be too late for many machines where the damage may already have been done.