Bagle.Q (Mutations ordered by Alphabet) uses just another exploit - security hole in the Internet Explorer and accompanied files.
Just opening an Bagle.Q - infected e-mail is all you need - because Bagle.Q loads itself via using an embedded Hyperlink.
I've got my information from
this German Article.
The links on the bottom of the article lead to descritions made by major Virus-Scanner developing companies, even in English <img src="/ubbthreads/images/graemlins/winkwink.gif" alt="" /> .
Quotation from NAI :
The worm uses the Object Tag vulnerability in Internet Explorer, which allows for the writing and overwriting of local files by exploiting the ADODB.Stream object. A remote file (random_name.php ) is downloaded upon viewing the email message. This file is actually a HTML file containing a VBS script, and it is detected as VBS/Psyme with the 4306 DATs or greater. When run, this script creates another VBS script (Q.VBS) - again detected as VBS/Psyme - which is responsible for downloading the worm from one of the following IP addresses.
There follows a list of a *lot* of IP-Adresses.
Also, Bagle.Q tries to kill Programs - resident guarding scanners, firewalls and some others.
Be careful !