Trojan

How to remove “Trojan.Win32.Copak.lbqm”?

Malware Removal

The Trojan.Win32.Copak.lbqm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lbqm virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.lbqm?


File Info:

name: 03855D3B0AA2D3A8EBB5.mlw
path: /opt/CAPEv2/storage/binaries/800893fb76628f3dbf0aa2cdbd62e3edd7f232845f7c2f143b9824b6760451c1
crc32: F9D0DC86
md5: 03855d3b0aa2d3a8ebb5d218e25e657b
sha1: ac49eca6bdcedcfd5b67762b5c30db6d3fd6ecec
sha256: 800893fb76628f3dbf0aa2cdbd62e3edd7f232845f7c2f143b9824b6760451c1
sha512: 2ee71473444cf3115ca8c64aa36d0cbd98552e6cdef025cc213225a08c06d2bfdf1e6f59ff0c47ff26cd9e027142cab1f4c574421511e169c94018e8d200c132
ssdeep: 3072:3r9tzsBcQgdyWO8HSaCFBhrVWPMVnJ6l3qjZQS9ORkvXYuXvU310AndSioUX:3r9tsBE3yHN1Jwq+S9zYSGSizX
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T19EF3CF0845061CF5F1F8D9FB9D304BF8B6A915FA2EFF0038975856E30CA9BA55E2C161
sha3_384: 200db4639928371b1d1fec6b70ace05a05547109d3eb82347dbf15b8f1ebadd5e57c8c0f7d9cfabca8f0b01c0cc1afa7
ep_bytes: bb13d39e2829c021d268d88540004881
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lbqm also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.865537
FireEyeGeneric.mg.03855d3b0aa2d3a8
ALYacGen:Variant.Razy.865537
CylanceUnsafe
ZillyaTrojan.Injector.Win32.1322282
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.01dd7e43
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.b0aa2d
BitDefenderThetaGen:NN.ZexaF.34114.kuZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DA822
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Copak.lbqm
BitDefenderGen:Variant.Razy.865537
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Trojan-gen
TencentTrojan.Win32.Copak.wa
Ad-AwareGen:Variant.Razy.865537
SophosML/PE-A + Troj/Agent-BGOS
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
EmsisoftGen:Variant.Razy.865537 (B)
GDataGen:Variant.Razy.865537
JiangminTrojan.Copak.bltx
eGambitUnsafe.AI_Score_99%
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=89)
Antiy-AVLTrojan/Win32.Injector
ArcabitTrojan.Razy.DD3501
MicrosoftTrojan:Win32/Glupteba.DB!MTB
AhnLab-V3Malware/Win32.RL_Generic.R293305
McAfeeArtemis!03855D3B0AA2
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
APEXMalicious
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Copak.lbqm?

Trojan.Win32.Copak.lbqm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment