Trojan

Trojan.Win32.Copak.bjsoj removal tips

Malware Removal

The Trojan.Win32.Copak.bjsoj is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.bjsoj virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the shellcode get eip malware family
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Trojan.Win32.Copak.bjsoj?


File Info:

name: 0B83E142D80E34ECD95C.mlw
path: /opt/CAPEv2/storage/binaries/f047c9d4ad1c111055b679ea40f99b62a07a95444b66275350a71d8d0d2dab39
crc32: B1D0DA55
md5: 0b83e142d80e34ecd95c2eb9adb9c799
sha1: 2d072c42765906124028455c9960b7840116ebd1
sha256: f047c9d4ad1c111055b679ea40f99b62a07a95444b66275350a71d8d0d2dab39
sha512: 3db370eebf163c6792c5072c302bbe9c770659b5bf9e40707f50ad2ca582cdd1a6765cd6f036551e07bb970935286f4674511a3dd03b1542c1bd1d9cd41c3117
ssdeep: 6144:3L/z7cxsRxs3e+OS0ZmV66/PyNjQmrrbc67dAN5:3L/nccSenSUlNxrbcoU
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1B044DF89E2F771C0DB93C37EAD1153A3B6467E6D22ECB6B634104198D2768016FF12E6
sha3_384: 83cad368e274f958ea6ba52a6256787d169f17e8a63b03a515bd836c88878f3cb67d16f0fe769b804735e380daa22d72
ep_bytes: 65399ce73550186030b111f122f3794b
timestamp: 1974-02-09 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.bjsoj also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
FireEyeGeneric.mg.0b83e142d80e34ec
SkyhighBehavesLike.Win32.Backdoor.dc
Cylanceunsafe
ZillyaTrojan.KryptikAGen.Win32.23340
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Copak.6daa6f4b
K7GWTrojan ( 005a45ef1 )
K7AntiVirusTrojan ( 005a45ef1 )
BitDefenderThetaGen:NN.ZexaF.36744.q4Z@aiNtz3j
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik_AGen.BGU
APEXMalicious
ClamAVWin.Malware.Generic-10019342-0
KasperskyTrojan.Win32.Copak.bjsoj
NANO-AntivirusTrojan.Win32.Copak.jwiltf
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Copak.kq
TACHYONTrojan/W32.Selfmod
F-SecureTrojan.TR/Crypt.XPACK.Gen
DrWebTrojan.PackedENT.123
TrendMicroTROJ_GEN.R03BC0DB324
SophosMal/Inject-GJ
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Selfmod.bbhb
GoogleDetected
AviraTR/Crypt.XPACK.Gen
VaristW32/Trojan.NJGF-3047
Antiy-AVLTrojan/Win32.Kryptik.girh
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ZoneAlarmTrojan.Win32.Copak.bjsoj
GDataWin32.Trojan.PSE.11XGYE9
CynetMalicious (score: 100)
AhnLab-V3Packed/Win.FJB.R620290
Acronissuspicious
McAfeeTrojan-FVOQ!0B83E142D80E
VBA32Trojan.Khalesi
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R03BC0DB324
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
IkarusTrojan-Downloader.Win32.FakeAlert
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
Cybereasonmalicious.276590
DeepInstinctMALICIOUS

How to remove Trojan.Win32.Copak.bjsoj?

Trojan.Win32.Copak.bjsoj removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment