They search for email addresses in files on an infected PC and send themselves as an attachment to spoofed emails. They can also make duplicate copies of themselves on an infected PC and configure themselves to run when Windows starts.
Use the following free Microsoft software to detect and remove this threat:
Win32/Atak may also terminate security-related software such as antivirus software and firewall software on an infected computer. It may try to disable other malware that it finds on the infected computer.
Some variants of Win32/Atak (including Win32/Atak.B@mm and Win32/Atak.C@mm) may contain backdoor functionality that will listen on TCP port 1000 to receive files from an attacker and run the received files.
Some variants (including Win32/Atak.C@mm) may try to perform a Denial-of-Service attack on www.techtv.com by trying to connect to its website numerous times.