Trojan:Win32/Occamy.C

Trojan:Win32/Occamy.C is a malware that can drop malicious files onto the computer, which tend to lock files and demand payment from users in order to regain access. Some security programs deem Trojan:Win32/Occamy.C as a ransomware threat that causes high potential damage.

Illustration for Trojan:Win32/Occamy.C

How does it infect the computer?

With computers connected globally via the internet, the handlers of Trojan:Win32/Occamy.C are taking advantage of this network to spread the virus. In most infection cases, it was noted that Trojan:Win32/Occamy.C penetrates the computer via spam email messages. It is attached to an email pretending to be a valid document file. Once the recipient opens the file, Trojan:Win32/Occamy.C initiates the attack on the computer.

Some infection instances of Trojan:Win32/Occamy.C can be traced to the downloading and installation of cracked software, particularly those that are obtained from torrent sites and insecure file-sharing networks. In this scheme, attackers are embedding the Trojan:Win32/Occamy.C virus into installer files. Since the actors behind this virus cleverly concealed the cipher, local anti-virus programs may fail to detect it sometimes.

How does this malware operate?

During the time that Trojan:Win32/Occamy.C is active on the computer, users have no way to learn its existence. Most of the time, it has already caused damage to files, programs, and operating systems before they were able to grasp the idea that a computer is infected with Trojan:Win32/Occamy.C.

The attacker’s objective in sending this virus to a random computer is based on the idea that they can further utilize the compromised system for other malicious actions, including the following:

  • Opens a backdoor port to allow remote access.
  • Command the infected computer to download additional malware from a specified server.
  • Update the current infection to a high-risk threat.
  • Generate revenue by using the infected computer for click-fraud.
  • Collect data like operating system version, browser make and version, IP address, username, and password.
  • Inject aggressive ads into the browser program.

In addition, this Trojan will drop the following files:

  • C:\Users\Username\AppData\Local\Microsoft\Windows\INet Cache\IE\MIPY49MB\MicrosoftSecurity[1].exe
  • C:\ProgramData\update.exe
  • C:\Users\Username\AppData\LocalLow\Microsoft\Cryptnet Url Cache\Content\5CEA8CFB8047B569B331D0E79D28457D

Trojan:Win32/Occamy.C finds a way to execute the embedded files on every Windows boot-up by adding relevant registry entries. While Trojan:Win32/Occamy.C remains as a memory resident, computer users will have difficulty removing the virus, and sometimes even an anti-virus program could not be of help in this situation. Malware researchers find hope in successfully deleting Trojan:Win32/Occamy.C if the computer is running in Safe Mode, where the virus is not memory-resident.

List of Trojan:Win32/Occamy.C Variants
Version Name Alert Level Date Added
Trojan:Win32/Occamy.C!bit Severe Oct 12, 2023
Trojan:Win32/Occamy.C!MTB Severe May 09, 2023
Trojan:MacOS/Occamy.C Severe Aug 14, 2022
Trojan:Win32/Occamy.C is also detected as:
AhnLab-V3 Trojan/Win32.Agent.C3252505
AVG Win32:Malware-gen
BitDefender Trojan.GenericKD.32443991
Fortinet W32/GenKryptik.A!tr
F-Secure Trojan:W32/Ursnif
Kaspersky Trojan-Banker.Win32.Gozi.md
Malwarebytes MachineLearning/Anomalous.94%
McAfee Artemis!9CA9C896F029
Panda Trj/CI.A
Sophos Mal/Generic-S
TrendMicro Trojan.Win32.OCCAMY.AMN

For more help

Trojan:Win32/Occamy.C belongs to a threat family in which multiple varieties have been released into the wild. Please browse the Trojan category to see additional related dangers and eradication methods.

How to remove Trojan:Win32/Occamy.C?

To totally remove Trojan:Win32/Occamy.C from the computer and get rid of relevant viruses and trojans, please execute the procedures as stated on this page. Make sure that you have completely scanned the system with the suggested malware removal tools and virus scanners.

Quick Fix - Scan the PC with Combo Cleaner for Windows

Combo Cleaner is a trusted PC security and optimization tool equipped with a powerful virus and malware detection engine. This program can get rid of hazardous viruses like Trojan:Win32/Occamy.C through this procedure.

1. Download the application from the following page:

2. Save the file to your preferred location.

3. Double-click the downloaded file CCSetup.exe and install with the default settings.

CC for Windows Installation

4. At the end of the setup process, click Finish to run Combo Cleaner.

5. The tool will update the signature file, please wait for this process to complete.

6. To begin checking for threats like Trojan:Win32/Occamy.C, click on the Start Scan button. Wait for this scan to finish.

CC for Windows Start Scan

7. At the end of the scan process, click on Remove all threats to delete the Trojan:Win32/Occamy.C virus, including all malicious objects from the computer.

Free features of Combo Cleaner for Windows include Disk Cleaner, Big Files finder, Duplicate files finder, and Uninstaller. To use antivirus, privacy scanner, and to delete identified threats, users have to upgrade to a premium version.

Please continue with the succeeding removal procedures if you are comfortable manually getting rid of the virus and malicious items linked to it.

Step 1 : Start Windows in Safe Mode With Networking

The method of running Windows in Safe Mode before running a virus scan is effective in getting rid of Trojan:Win32/Occamy.C. This process can prevent most viruses and malware from loading, making it easier to detect and remove them.

1. On the Windows Search bar, please type msconfig.

Screenshot of MSConfig Command

2. Select and open System Configutation on the list of found results.

3. Once you are in the System Configuration window, go to the Boot tab.

Screenshot of SafeBoot

4. Under the Boot Options area, please check Safe Boot and select Network. This will allow Windows to boot in Safe Mode with Networking.

5. Lastly, click on Apply and OK to save the changes.

6. Please restart Windows.

Do not forget to restore the normal boot process of Windows after running the virus scan. Simply repeat the method above, and this time, uncheck the Safe Boot option to run Windows normally.

Step 2 : Run a virus scanner

To remove Trojan:Win32/Occamy.C, we suggest that you scan the infected computer with this powerful virus removal tool. It can detect and get rid of Trojans, viruses, malware, and adware from the infected computer. To fully protect the computer against Trojan:Win32/Occamy.C or similar attacks, you can activate Sophos to have real-time scanning and complete defense against all forms of threats.

1. Download Sophos Virus Removal Tool from the link below. Save the file on your computer where you can easily access it.

2. Once the download completes, browse the location of the file. Double-click to run the program and begin the install process.

3. On the first window of installation wizard, click Next to continue. Then, it will display the program’s License Agreement. You need to Accept the terms in order to proceed. If Windows prompts for User Account Control, please click Yes to proceed.

Screenshot of Sophos EULA Page

4. On succeeding windows, click Next or Continue to carry on with the installation. After completing the installation process, Launch Sophos Virus Removal Tool.

5. An internet connection is required when running this scanner in order to download important updates. Make sure that everything is up-to-date to effectively remove viruses like Trojan:Win32/Occamy.C.

6. Click the Start Scanning button to  carry out the Scan. This will check the system for the presence of malicious objects, malware, and viruses. The tool reveals items that were found linked to Trojan:Win32/Occamy.C and other suspicious entities. Be sure to remove all identified threats.

Screenshot of Sophos Virus Scan

After executing the above instructions, Trojan:Win32/Occamy.C should have been completely removed from the computer. If there are still signs of infection or the computer is displaying unusual behaviors, please continue with the remaining procedures.

Another alternative for Windows 10/11 users is to scan the computer with Microsoft Defender Offline. This will run a virus scan in the recovery environment.

Step 3 : Double Check with Windows Security Apps

Microsoft Windows has a built-in security application that you can use to double-check if your computer is still infected with Trojan:Win32/Occamy.C. For Windows 10/11 users, please run Windows Security.

Windows 10 / 11 Instructions:

Windows Security is a free tool that was built to help you remove Trojan:Win32/Occamy.C, viruses, and other malicious items from Windows 10/11 systems. Follow these procedures to scan your computer with the tool:

1. Tap or click the Search charm, search for Windows Security, and then open the application.

Image of Windows Security Search

2. On the Home tab, click Virus and threat protection from the sidebar.

3. On the main window, click on Scan Options. Then, click on Full Scan button.

Image of Scan Options

4. Lastly, click on the Scan now button to start scanning for the presence of Trojan:Win32/Occamy.C. The process may take a while to complete.

5. After the scan, Delete/Quarantine identified threats, whether they were relevant to Trojan:Win32/Occamy.C or not. You may now restart Windows to complete the virus removal process.

For older versions of Windows, you can scan the computer for free with the Microsoft Malicious Software Removal Tool (MSRT 64-Bit). It is a stand-alone virus scanner tool that targets prevalent malware groups.

How to protect the computer from Trojan:Win32/Occamy.C?

The initial defense that comes to mind for any computer user is to install an anti-virus or anti-malware program. This move is sensible and probably the most practical way to protect the computer against a Trojan:Win32/Occamy.C attack. Hence, keep in mind that having security software does not guarantee full protection. The majority of the prevention still lies in being cautious of users, and therefore, we are providing the following information as guidelines to protect the computer from virus infection.

Avoid Malicious Websites

There are enormous numbers of websites that were made for the primary purpose of spreading Trojan:Win32/Occamy.C. Normally, these sites are involved in integrating malicious pop-up and browser hijacker, that will eventually cause further virus infections. Avoid such websites.

Ignore and Delete Phishing Emails

The mass-mailing of computer viruses gives the attackers the luxury of spreading their malicious code in just one send-off. This will arrive in the inbox as an email that appears to be from a legitimate organization. So, if you receive an unexpected email with a link or an attached file, better delete it immediately.

Do Not Click a Suspicious Link

Links from social media, forums, and blog sites are sometimes being utilized by attackers to drive web users to a malicious page that contains malicious code. Therefore, do not just click on any link, especially if it looks suspicious. Accidental access to the destination site may lead to a Trojan:Win32/Occamy.C infection.

Be Careful When Downloading Files

Cracked software, serial key generators, and several freeware are seen as another method that spreads the Trojan:Win32/Occamy.C virus. Avoid acquiring these types of applications, and if there is a need to download freeware or shareware, be sure to obtain it from the official website or trusted providers.

About the author

7 thoughts on “Trojan:Win32/Occamy.C”

  1. Andreas Altheimer

    I found this trojan in a bios update from ACER!!! Acer Aspire E1-570G BIOS_Acer_2.06_Windows

  2. I was downloading Minecraft from minecraft.net, and I got a notification saying my real-time protection was off, and when I got to windows defender, it detected the Trojan!

  3. Someone I trusted asked me to download this game from “Steam” they sent me the link and once I know it the computer is infected :(

  4. Interesting seeing such recent posts for this trojan. My computer just found it in a very old file I had downloaded years and years ago supposedly with keygens and cracks.

  5. I got this alert when downloading kali linux from the official kali website inside a .deb file so I suspect it is a false positive. The file it triggered on was D:\pool\main\b\beef-xss\beef-xss_0.5.0.0+git20191218-0kali2_all.deb
    I then restored it and now it complained about D:\pool\main\f\framework2\framework2_2.0-1kali0_all.deb and D:\pool\main\h\hyperion\hyperion_2.0-0kali3_all.deb

    I find it strange that someone would place a windows trojan inside debian files…

  6. If it is found from the Kali Linux official website, and the SHA256 checksum matches with what is on the website, is is a false positive. This is because Kali Linux has a lot of tools for penetration testing like a Cisco hijacker, but the program is legit. The only problem I see, is that the .deb file the exploit is kept in could create a backdoor into Kali OS. I’m not an expert, but this make logical sense to me that if you want this tool, it is a false positive. I get false positives from rescue disks that scan Kali because of a lot of “Hack tools”. Just check the SHA256 hash on the ISO, and you should be fine.

  7. I have got this alert several times from Windows Security. I connected the first occurrence of the alert to just two minutes after downloading an old game called Contract Wars. I just ran the game and turns out that my computer is muting notifications when I play games which is why I didn’t realize that it is the game that is causing this. Every time I play it, windows security sends this alert and it says it removes a file. I assume that it just keeps happening because of how old the game is. Either way, I plan on uninstalling Contract Wars so I don’t have to see this all the time.

Leave a Comment

Your email address will not be published. Required fields are marked *