
Zhelatin.o was identified by the company on 4 February and is rated as a 'moderate' risk.
The worm spreads via email as an infected attachment. The subject line, message body and attachment are variable.
Zhelatin.o is a portable executable file packed with UPX. The worm copies itself to the hard disk and modifies the registry to ensure that it loads automatically on start up.
It then harvests email addresses from the hard disk and automatically sends itself via email by directly connecting to the recipient's SMTP server.
The malware also terminates a range of antivirus and firewall applications, and hides its own processes, files and registry changes using a kernel-mode rootkit.
David Emm, senior technology consultant at Kaspersky Lab, said: "This is the latest in a series of Zhelatin variants.
"Like many email worms, it uses social engineering in an attempt to lure users into double clicking on the infected attachment."
Removal guidelines can be found at Viruslist.com.