Categories: Trojan

Trojan:Win32/Occamy.C85 (file analysis)

The Trojan:Win32/Occamy.C85 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Occamy.C85 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (7 unique times)
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Checks for the presence of known windows from debuggers and forensic tools
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Steals private information from local Internet browsers
  • Attempts to identify installed AV products by installation directory
  • Checks for the presence of known devices from debuggers and forensic tools
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Anomalous binary characteristics

Related domains:

iplogger.org
apps.identrust.com
ip-api.com
isrg.trustid.ocsp.identrust.com
ocsp.int-x3.letsencrypt.org
rrrload07.top

How to determine Trojan:Win32/Occamy.C85?


File Info:

crc32: B8187C71md5: 224bf2d66ccf760d55253ab3901482e2name: file.exesha1: 4a6ebb8bfd026a782f125e88f2ecf191015e9949sha256: 85d879be258470ed22d55bb6fda8be5d0b7d480c23d95b252516e85ccad2fec4sha512: 3c77e7d62c295c2d5251a4e06ce8421214e442e05fe4fed94928205e085fc2ea709207084853feacdac2bec140e4d28efa76bc298b160b05c599fb0aee60ceb1ssdeep: 196608:tFcBJIallQT25cRGDZ9mkoxEpX5pUPxitjUpv382CE:kSaD/cRo0kNpX5pUPYUpv382CEtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: InternalName: FileVersion: 1.1.31.00ProductName: ProductVersion: 1.1.31.00FileDescription: OriginalFilename: Translation: 0x0409 0x04b0

Trojan:Win32/Occamy.C85 also known as:

Bkav HW32.Packed.
DrWeb Trojan.Siggen9.54882
MicroWorld-eScan Trojan.GenericKD.43360121
McAfee Artemis!224BF2D66CCF
Cylance Unsafe
CrowdStrike win/malicious_confidence_80% (W)
BitDefender Trojan.GenericKD.43360121
K7GW Trojan ( 005687551 )
K7AntiVirus Trojan ( 005687551 )
Arcabit Trojan.Generic.D2959F79
TrendMicro Trojan.Win32.WACATAC.THFAHBO
Cyren W32/Trojan.VFPQ-1961
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Packed.Enigma.EY
APEX Malicious
Avast Win32:Trojan-gen
Kaspersky HEUR:Trojan-PSW.Win32.Coins.gen
Alibaba TrojanPSW:Win32/Coins.09e6d11a
AegisLab Trojan.Win32.Coins.i!c
Endgame malicious (high confidence)
Emsisoft Trojan.GenericKD.43360121 (B)
F-Secure Trojan.TR/PSW.Coins.oiyco
Invincea heuristic
McAfee-GW-Edition BehavesLike.Win32.Dropper.rc
Fortinet W32/Agent.81BB!tr
FireEye Generic.mg.224bf2d66ccf760d
Sophos Mal/Generic-S
Ikarus PUA.EnigmaProtector
Avira TR/PSW.Coins.oiyco
MAX malware (ai score=87)
Microsoft Trojan:Win32/Occamy.C85
ZoneAlarm HEUR:Trojan-PSW.Win32.Coins.gen
Cynet Malicious (score: 85)
VBA32 TrojanPSW.Coins
ALYac Trojan.GenericKD.43360121
Ad-Aware Trojan.GenericKD.43360121
Malwarebytes Trojan.Downloader.AHK
Panda Trj/Genetic.gen
TrendMicro-HouseCall Trojan.Win32.WACATAC.THFAHBO
SentinelOne DFI – Malicious PE
eGambit Unsafe.AI_Score_98%
GData Trojan.GenericKD.43360121
AVG Win32:Trojan-gen
Paloalto generic.ml

How to remove Trojan:Win32/Occamy.C85?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

Application.Bundler.DomaIQ.Q (B) removal guide

The Application.Bundler.DomaIQ.Q (B) is considered dangerous by lots of security experts. When this infection is…

46 mins ago

Jatif.4890 information

The Jatif.4890 is considered dangerous by lots of security experts. When this infection is active,…

46 mins ago

Midie.127575 removal

The Midie.127575 is considered dangerous by lots of security experts. When this infection is active,…

47 mins ago

Malware.AI.1974689421 malicious file

The Malware.AI.1974689421 is considered dangerous by lots of security experts. When this infection is active,…

53 mins ago

Generic.Dacic.94CCEEA9.A.32453306 (file analysis)

The Generic.Dacic.94CCEEA9.A.32453306 is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago

Fugrafa.312973 information

The Fugrafa.312973 is considered dangerous by lots of security experts. When this infection is active,…

2 hours ago