Trojan

Should I remove “Trojan.Win32.Copak.lbbr”?

Malware Removal

The Trojan.Win32.Copak.lbbr is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lbbr virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.lbbr?


File Info:

name: 92CFF5D7E4AA9B516EA9.mlw
path: /opt/CAPEv2/storage/binaries/c1b223b880fcbe55dec46c3b5f82471811d3c064f96b3dc3a300904df8825219
crc32: 685A02E6
md5: 92cff5d7e4aa9b516ea98dacf023ef26
sha1: ab2069aaa4376bcee32f6f839bea2dd5e24b9c80
sha256: c1b223b880fcbe55dec46c3b5f82471811d3c064f96b3dc3a300904df8825219
sha512: a58ec1a3e69522d264e8164da6552d9ba038a51306be56000c745e436d45930855cf3b2b8ceaabb52d1ba8102a670982f7414dfc240b85400c99ffb5111b896b
ssdeep: 49152:loo0Tab6T3Y6PJZDfTKIC892zTOCr0xh8co/WefAQQuVJ4RBSaPiAUrg56Ak5+ua:lTGT3wI0yoQQQeJ4OaPiAUU5kLQhV
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T192E533003E972D1FC685267124E6F4B664C51CE8E570EF1B203DC47EC866CA2BB79E26
sha3_384: b738278c491a481708906e674ceed4685943dd65439878420d4bd26ffb5133df1c82b377686ea7734f81e9e3263b3942
ep_bytes: be0000000083ec04890c2409fb4b5868
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lbbr also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Fragtor.30687
FireEyeGeneric.mg.92cff5d7e4aa9b51
McAfeeGenericRXAA-FA!92CFF5D7E4AA
CylanceUnsafe
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
K7GWTrojan ( 0057ffc71 )
K7AntiVirusTrojan ( 0057ffc71 )
CyrenW32/CoinMiner.CQ.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HITO
APEXMalicious
AvastWin32:CoinminerX-gen [Trj]
KasperskyTrojan.Win32.Copak.lbbr
BitDefenderGen:Variant.Fragtor.30687
TencentTrojan.Win32.Coinminer.yi
Ad-AwareGen:Variant.Fragtor.30687
SophosMal/Generic-R
ComodoPacked.Win32.MUPX.Gen@24tbus
DrWebTrojan.Packed2.43250
TrendMicroTROJ_GEN.R03BC0DLN21
McAfee-GW-EditionBehavesLike.Win32.Generic.wc
EmsisoftGen:Variant.Fragtor.30687 (B)
GDataGen:Variant.Fragtor.14346
AviraTR/Crypt.ULPM.Gen
Antiy-AVLTrojan/Generic.ASBOL.C690
ArcabitTrojan.Fragtor.D77DF
MicrosoftTrojan:Win32/Injector.RAQ!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Gen.RL_Reputation.R365206
BitDefenderThetaGen:NN.ZexaF.34114.epZ@aeFnovj
ALYacGen:Variant.Fragtor.30687
MAXmalware (ai score=80)
VBA32Trojan.Packed
MalwarebytesRiskWare.BitCoinMiner.UPX
TrendMicro-HouseCallTROJ_GEN.R03BC0DLN21
RisingTrojan.Injector!1.C865 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.Sality.AA
FortinetW32/Kryptik.EAHK!tr
AVGWin32:CoinminerX-gen [Trj]
Cybereasonmalicious.aa4376
PandaTrj/Genetic.gen

How to remove Trojan.Win32.Copak.lbbr?

Trojan.Win32.Copak.lbbr removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment