Pikachu
Summary
The hyped-up 'Pokey' virus doesn't seem to be widespread.
Pikachu is an Internet worm that spreads itself as an executable file attachment using Microsoft Outlook. The worm was written in Visual Basic 6 and it requires VB6 libraries to be present in a system to run.
Removal
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
- Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
- Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
- Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Technical Details
The worm usually arrives in an email message that looks like that:
Subject: Pikachu Pokemon Body: Great Friend! Pikachu from Pokemon Theme have some friendly words to say. Visit Pikachu at http://www.pikachu.com See you.
The worm is attached to this message as the PIKACHUPOKEMON.EXE file. The file has an icon resembling Pikachu character.
When a user clicks on the attachment, the worm is activated. It shows a dialog with Pikachu image and the following text:
Between millions of people around the world i found you. Don't forget to remember this day every time MY FRIEND! Visit us at http://www.pikachu.com
The dialog that the worm shows upon activation looks like that:
Then the worm accesses Outlook address book and sends messages with its body attached to everyone in this address book.
The worm has a dangerous payload. It adds several commands to AUTOEXEC.BAT file that will delete \Windows\ and \Windows\System\ folders when a system is restarted. A system asks confirmation to delete files, so if a user doesn't press 'Y', his files are not deleted.
More Support
Community
Ask questions in our Community.
User guides
Check the user guide for instructions.
Contact Support
Chat with with or call an agent.
Submit a Sample
Submit a file or URL for analysis.