Wacatac Trojan: What Is It And How To Remove It

Updated on Dec 3, 2025 by Andrea Miliani

The Wacatac trojan is a kind of malware that usually targets Windows PCs. This trojan can hide very well to evade detection, steal your passwords and credentials, download other malware, and act as a Remote Access Trojan (RAT). 

In this article, we’ll explore all you need to know about Wacatac trojans. From understanding their behavior and detecting them to removing this dangerous malware from your devices, and preventing future infections.

What Is a Wacatac Trojan?

A Wacatac trojan is a sneaky type of malware used by malicious actors who often use social engineering techniques to trick unsuspecting victims into installing it on their devices. 

Wacatac isn’t a single piece of malware; it’s the name of a malware family. There are multiple variants out there that can target different Windows versions and offer different or additional functionality.

Although it was first documented in January 2020, one of the most frustrating aspects of this threat is that new variants emerge frequently as attackers continuously modify the malware to evade detection.

Like many other Trojans, this malicious software disguises itself as an innocent program to trick you into installing it on your device. Once it settles into your system, it begins executing its harmful operations silently in the background. If it’s detected, it should be removed as soon as possible, ideally using reputable anti-malware or antivirus software.

Different variants show up under different names, including Trojan:Script/Wacatac, Trojan:Win32/Wacatac, Trojan.Win32.VBKryjetor.bzrz, or Wacatac.b!ml.

How Does the Wacatac Trojan Behave?

Once installed, the Wacatac trojan usually connects to a Command-and-Control (C2) server, a system that attackers use for remote communication, allowing them to take control of your computer.

The Wacatac trojan has been used to:

  • Steal credentials: It captures passwords, login credentials, banking information, and other sensitive personal data. The malware can include a keylogger – a tool that records everything you type – to monitor your activity and gain access to your passwords and private accounts.
  • Evade certain antivirus software: The malware usually hides within the system and uses obfuscation techniques such as packers – tools to compress or encrypt files – to dodge detection scans. Certain antivirus programs might not detect it on time or may require a full antivirus scan.
  • Create or join botnets: The Wacatac trojan can link infected devices to a botnet – a network of infected computers – to perform DDoS attacks, cryptomining, or deploy spam campaigns.
  • Cause system damage: Depending on the variant, it can modify files, severely affect programs and functionalities, and overheat devices, forcing you to reinstall Windows or even replace your device.
  • Enable spyware capabilities: It can record credentials and cookies, and allow attackers to take screenshots or download other spyware.
  • Act as ​​Remote Access Tools (RATs): Provide full remote control to attackers via the C2 server, letting them operate the infected system as if they had physical access.
  • Download other malware: It’s capable of downloading other malware once installed on your device, as it establishes backdoors and runs programs that activate other downloads after infiltrating your system.

Through all of these capabilities, the Wacatac trojan allows attackers to gather sensitive data and use it to threaten victims, request ransom, or engage in long-term snooping. 

Symptoms of a Wacatac Malware Infection

Even if the malware behaves like a ninja, you can still spot it by monitoring your device for the following symptoms: 

  • Slow and poor performance.
  • Freezing or crashing programs.
  • Programs failing to launch.
  • Reduced storage space.
  • Newly added or modified files.
  • Unknown processes in Windows Task Manager.

While being aware of these symptoms is useful, the best way to detect a Wacatac virus is by using reliable antivirus software or an anti-malware app. 

Modern, trustworthy antivirus software includes features such as real-time scanning, which enables immediate detection, and signature-based detection, which constantly compares programs in the system to identify malicious patterns.

Wacatac infected PC featuring a list of symptoms

What Is a Wacatac False Positive?

While running reliable antivirus software is the best way to protect your computer and remove Trojans, it’s important to remember that these tools aren’t perfect. Sometimes, they can mistakenly identify legitimate programs as Wacatac malware.

Many social media users have reported that their antivirus systems have mistakenly flagged several programs as Wacatac trojans. It’s become so common that you can even find memes on X and other social media platforms by searching for the term “wacatac.”

According to users on Reddit, multiple antivirus solutions rely on AI-based models to detect suspicious behavior, which can cause them to mislabel certain downloaded programs or even ZIP files as potential Wacatac threats.

Your antivirus may also report a Wacatac false positive. Some software installers – especially those hosted on third-party sites – can modify the files on your computer in ways that resemble malware activity.

How to Spot a Wacatac False Positive

If your antivirus has flagged a Wacatac trojan and you think it might be a false positive, there are a few steps you can take to verify. 

1. Reflect on Your Recent Activity and Look for Symptoms

Consider which websites or platforms you’ve visited lately, and take notes on any new programs installed. Did you download new software from a third-party source? Did you open an attachment from a suspicious email?

If so, pay attention to how your PC is behaving. Is it running more slowly than usual? Are applications crashing or failing to launch? If you don’t recognize these symptoms or haven’t downloaded anything from a suspicious source, it might be just a false positive.

2. Check the File Name and Location

Using your antivirus software, you can request more details about the detected threat. You can click on a “Quarantine” option or, if you use Microsoft Defender, view the information in the Protection History to see the file’s name and location.

For example, it may appear as “Trojan:Win32/Wacatac.B!ml” and be located in your project folder. The “!ml” suffix often means that a machine-learning model made the detection and that the file may be harmless. You can also search the file name online to see how others have reported it.

Also, the folder location is important. ​​If the file is stored in a folder from a developer or software you know, it could be a false alarm. However, it might be a real Wacatac trojan if it’s located in a random temporary folder.

3. Scan the File Using Anti-Malware Software

Upload the file or copy the download link and scan it using a malware detection platform such as VirusTotal. This platform will show whether other software or antivirus recognizes the file as a threat. If only Microsoft Defender flags it as a Wacatac trojan, it’s probably a false positive. But, if two or more engines flag it as malicious, then it might be real malware.

screenshot of VirusTotal home page

You can also submit it to the Microsoft Security Intelligence Portal (MSI) as a false positive and let professionals take a look and contact you via email.

How a Wacatac Trojan Enters Your Computer

Malicious actors use multiple strategies to spread this malware. These are a few of the most common sources of infection: 

  • Unofficial software: The most common source. Bear in mind that cybercriminals are experts at mimicking official websites and platforms. When you download software from these unofficial sites, your chances of downloading this malware increase significantly.
  • Malicious web pages: You may land on one of these pages accidentally while browsing or clicking on the wrong link. Always double-check that the websites you visit are legitimate and secure by reviewing the spelling of the URL and looking for the padlock icon in the address bar, which shows you the site is secure.
  • Phishing emails: Fake emails claiming to be from your bank or favorite social platform, warning that your account will be closed if you don’t act immediately, may trick you into downloading this trojan.

Understanding how attackers operate and getting familiar with their strategies is essential to staying safe from this harmful malware.

How to Remove a Wacatac Trojan

So, you accidentally downloaded the wrong program, and now a Wacatac trojan has infected your precious PC. What now? First, take a deep breath, then take action.

There are multiple ways to remove a Wacatac trojan from your device. The easiest and safest method is through an antivirus program. Reputable anti-malware or antivirus software should detect the Wacatac infection and provide instructions on what to do. You can also do it manually to make sure you remove all threats.

How to Remove a Wacatac Trojan Using Antivirus Software

If you already have an antivirus installed, it will probably notify you immediately. You can also start a manual scan to confirm the detection. If you don’t have one, now is a good time to install a trusted one and run a full system scan so that it can locate the malware. 

Windows Security Software window showing the scan alternatives and marking the "Full Scan" option

Once detected, the antivirus will give you options on how to proceed, such as “quarantine,” “remove,” “allow,” or provide more information. 

After you choose to remove it, the antivirus will stop the program’s activities, delete infected files, and clean your computer’s system.

Depending on the program, the variation caught, and the damage caused, it may recommend more actions, such as restarting your computer or performing a deep cleanup.

How to Remove a Wacatac Trojan Manually

Removing Wacatac malware manually is only recommended if you have some technical knowledge and feel confident doing it. 

Wacatac malware is hard to remove manually because it places its files in multiple locations on your disk – from which it can restore itself even if you delete it from other folders. Also, the Wacatac trojan changes some of your system’s settings, like your computer’s network settings and Windows Group Policies, which can be difficult to set back to the original safe settings.

If, after understanding the challenges, you still want to try the manual removal, bear in mind that some experts recommend disconnecting from the Internet, and backing up important files and documents – images, audio files, videos, and other non-executable files – to a clean external drive or cloud storage before starting the process. Avoid backing up executable programs, as these may be infected and could spread the malware.

These are the basic steps for manual removal:

    Boot your computer into Safe Mode: press Windows + R key, type “msconfig” in the Run dialog box, and press “OK.”
    Windows settings box Run featuring "msconfig" option

    Then, select the “Safe Boot” option. Restart your computer in Safe Mode.

    Windows System Configuration box featuring Safe Boot option
    1. Stop the Wacatac activities: Check Task Manager to verify if there are sketchy tasks you don’t recognize, and click on “End Task” for any that look suspicious.
    Task Manager interface showing active programs
    1. Remove malicious programs: Go to the Installed Apps section and remove all suspicious apps by selecting “Uninstall” in the three dots next to the app description, and follow the instructions.
    Windows' installed apps program featuring multiple apps and their sizes.

    How to Remove a Wacatac Trojan from Your Browser

    After removing a Wacatac trojan from your device, it’s important to also clean your browsers. Here are the basic steps for the most popular browsers for Windows users: 

     Google Chrome

    1. Go to Settings: You’ll find this section by clicking the three dots in the top-right corner and selecting the option at the bottom of the menu.
    Google Chrome menu bar featuring "Settings" option
    1. Reset settings: Go to the Reset settings section, click on Restore settings to their original defaults, and click on the “Reset Settings” button.
    Pop-up message for Reset Settings with details of the action on Google Chrome

    Microsoft Edge

    1. Go to Settings: click on the three dots in the upper-right corner and select “Settings.”
    Microsoft Edge menu bar featuring "Settings" option
    1. Reset settings: Go to the Reset settings section, click on “Restore settings to their original values”, and accept the reset.
    Microsoft Edge Reset Settings pop-up message

    Mozilla Firefox

    1. Go to Help: click on the menu, the three horizontal lines at the top right corner, and select “Help.”
    Mozilla Firefox Menu settings featuring  Help option
    1. Click “More troubleshooting information.”
    Menu settings featuring "More troubleshooting information" option
    1. Refresh Firefox: follow instructions to complete the reset.
    Firefox's Troubleshooting Information menu featuring "Refresh Firefox" option

    How to Prevent a Wacatac Infection

    The best way to avoid getting a Wacatac Trojan is to:

    Avoid downloading questionable software: Especially anything downloaded from non-official websites.
    Follow good digital hygiene: Don’t click on links or attachments in suspicious emails, and avoid clicking on sketchy ads while browsing.
    Keep your software up to date: Make it part of your regular habits.
    Back up your data: Make sure you keep the information important to you also stored on an external drive or trusted cloud storage account.
    Use a good-quality antivirus: Scan your device frequently. It might take a few minutes of your time, but can save you from the pain of dealing with a Wacatac Trojan infection.

    If you’ve already been infected with the malware and have removed it from your device, remember that the experience can also be an opportunity for reflection and learning. Understanding how the infection occurred is key to preventing future threats.

    Identify the Source

    Once the threat has been removed and all the cleaning and restoration processes are complete, it’s always useful to identify the source. Take a moment to reflect on your recent activity: suspicious emails, unfamiliar websites, newly downloaded courses or programs, and so on.

    Identifying the source will not only help you avoid going through this energy-draining process again, but might also help others. If it has happened on a website that mimics an organization, you could report it to them so they can take action or notify their audience or customers. It can also be helpful to share your experience on social media or forums where others can benefit from your discovery. 

    FAQ

    What is Wacatac malware?

    The Wacatac malware is a trojan system capable of stealing sensitive information such as passwords and login credentials. It can also be used as spyware by attackers. Users can download it from phishing emails, pirated websites, or malicious platforms, and it’s hard to detect once installed.

    What is the Win32/Wacatac virus?

    Win32/Wacatac is basically just another name for a Wacatac trojan. The term Win32 Wacatac has been assigned by Microsoft Security Intelligence to label this threat. The term Win32 refers to the Microsoft Windows platform architecture, and Wacatac to identify the malware family.

    Is Wacatac Dangerous?

    Yes, the Wacatac trojan can cause severe damage if it gets onto your computer. Depending on the information stolen, the malware can provide attackers with passwords and credentials that can be used against you. Attackers usually request ransom or gain access to platforms such as banking or investing sites.

    Is a Wacatac a false positive or a real threat?

    Multiple users have been reporting Wacatac false positives in the past few years. It has been observed that certain files and programs can be flagged with the “Wacatac” label by an AI-powered antivirus mistakenly. There are a few steps you can take to verify if it’s a false positive, like monitoring your computer’s behavior, checking the file’s name and location, and scanning the file through a malware detector.

    Is Wacatac a RAT?

    Wacatac malware can be used by attackers as a Remote Access Trojan (RAT), as it connects to a Command-and-Control (C2) server once installed. Through the C2 system, hackers can control infected devices remotely and perform multiple malicious activities.

    How can I remove Wacatac or similar trojans from my device?

    There are primarily two ways to remove a Wacatac Trojan or similar malware from your device: with an antivirus or manually. Once the Wacatac malware has been detected, you can run a scan and request your preferred antivirus to remove it. You can also follow step-by-step guides to get rid of the Trojan manually, but it’s a riskier option if you don’t have experience.

    What are the signs of a Wacatac infection?

    Usually, you can detect a Wacatac infection because your computer performs poorly, and certain programs keep crashing or freezing. You may also notice modified files or the presence of new ones that you didn’t install or download, or realize that your storage space has been reduced.

    Can a VPN protect my data if my device is infected with Wacatac?

    No, VPNs focus on network privacy and not malware defense. If a Wacatac Trojan is installed in your device, it will not only not be recognized by the VPN, but it could also affect your VPN’s performance. It cannot prevent you from catching malware either; this usually happens when you accidentally click or download the wrong file.