Classification

Category :

Malware

Type :

Worm

Aliases :

Pikachu, Pokey, Pokemon, I-Worm.Pikachu

Summary

The hyped-up 'Pokey' virus doesn't seem to be widespread.

Pikachu is an Internet worm that spreads itself as an executable file attachment using Microsoft Outlook. The worm was written in Visual Basic 6 and it requires VB6 libraries to be present in a system to run.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The worm usually arrives in an email message that looks like that:

Subject: Pikachu Pokemon
Body:
Great Friend!
Pikachu from Pokemon Theme have some friendly words to say.
Visit Pikachu at http://www.pikachu.com
See you.

The worm is attached to this message as the PIKACHUPOKEMON.EXE file. The file has an icon resembling Pikachu character.

When a user clicks on the attachment, the worm is activated. It shows a dialog with Pikachu image and the following text:

Between millions of people around the world i found you.
Don't forget to remember this day every time MY FRIEND!
Visit us at http://www.pikachu.com

The dialog that the worm shows upon activation looks like that:

Then the worm accesses Outlook address book and sends messages with its body attached to everyone in this address book.

The worm has a dangerous payload. It adds several commands to AUTOEXEC.BAT file that will delete \Windows\ and \Windows\System\ folders when a system is restarted. A system asks confirmation to delete files, so if a user doesn't press 'Y', his files are not deleted.