Trojan

Trojan.Win32.Copak.lcih removal

Malware Removal

The Trojan.Win32.Copak.lcih is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lcih virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location

How to determine Trojan.Win32.Copak.lcih?


File Info:

name: 735B65CC91C6F2727ED3.mlw
path: /opt/CAPEv2/storage/binaries/274b616a401251f1a4fcd14a0427e5e00bd93fa1d117ba3a2994dd252a530d10
crc32: F2BE00CA
md5: 735b65cc91c6f2727ed3c354129b2c91
sha1: d2cec6176483b9620710dea1607cc4a034f2dae6
sha256: 274b616a401251f1a4fcd14a0427e5e00bd93fa1d117ba3a2994dd252a530d10
sha512: 295dc21c6d84ff8e83b08b2c296a185a847f52dfaa04564183b0937cea7831ca14c1b405121f8333879b3e64bf23cfb4aee8aa567b7b0dd9476f38147d8301fc
ssdeep: 24576:QnUcymQMq9z2qEPa4E2ZAbBPHbz2qEPaG:QnbqSPhXZqpYPB
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T15F05F0FB582E340ACE20D53AF93968C15E6EB5E785722CA0CEE9D01C556CE33794867C
sha3_384: de462e796082d7a68089d59550a94f892f2849476c3ba7c5b82998a5e8258942da08699f76707602c22dc02ac055a9c0
ep_bytes: ba5ff438f268d885400081eb01000000
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lcih also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.870640
FireEyeGeneric.mg.735b65cc91c6f272
ALYacGen:Variant.Razy.870640
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.0c50f388
K7GWTrojan ( 00577ea11 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZexaF.34160.YuZ@aSwc1te
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DA622
AvastWin32:Evo-gen [Susp]
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Copak.lcih
BitDefenderGen:Variant.Razy.870640
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
TencentMalware.Win32.Gencirc.10cfb14b
Ad-AwareGen:Variant.Razy.870640
EmsisoftGen:Variant.Razy.870640 (B)
TrendMicroTROJ_GEN.R002C0DA622
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
SophosMal/Generic-R + Troj/Agent-BGOS
Paloaltogeneric.ml
GDataGen:Variant.Razy.870640
JiangminTrojan.Copak.bkxw
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.336FBED
GridinsoftRansom.Win32.Wacatac.sa
ArcabitTrojan.Razy.DD48F0
MicrosoftTrojan:Win32/Glupteba.DB!MTB
AhnLab-V3Malware/Win32.RL_Generic.R293305
McAfeeGlupteba-FTSD!735B65CC91C6
MAXmalware (ai score=87)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Injector
APEXMalicious
RisingTrojan.Injector!1.CD26 (C64:YzY0Ov7GICVqbSeB)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/GenKryptik.CTNW!tr
AVGWin32:Evo-gen [Susp]
Cybereasonmalicious.c91c6f

How to remove Trojan.Win32.Copak.lcih?

Trojan.Win32.Copak.lcih removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment