It had actually been hiding in our environment since late May. Nothing caught it. When we submitted files to Microsoft and Symantec, they added the fingerprints to their Safety Scanner and definitions, respectively. We have since found it in about 8 devices out of around 750.
Symantec identifies it as Trojan.Gen.2 and it usually shows up in the c:\windows\system32\spoolv.exe file, which is not a valid file. SpoolSv.exe is a valid file. The Microsoft Safety Scanner identfies it as Mangzamel.A. If you run that tool, it can take 5 or more hours depending on the number of files on the system.
Before we had a successful way to scan a host, we were able to see outbound network activity bound for IP 202.172.40.232 in Singapore.