Trojan

Should I remove “Trojan.Win32.Copak.lckh”?

Malware Removal

The Trojan.Win32.Copak.lckh is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lckh virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location

How to determine Trojan.Win32.Copak.lckh?


File Info:

name: 536D7A635DEABFA7636B.mlw
path: /opt/CAPEv2/storage/binaries/727cb9be763c0690dfcb672f81b5fb4518230175c8d537afe04ac7ad5fe587dd
crc32: 5E5734B9
md5: 536d7a635deabfa7636b6955f677098d
sha1: 0af3b7f533512607da6d977aa3beec90db5af050
sha256: 727cb9be763c0690dfcb672f81b5fb4518230175c8d537afe04ac7ad5fe587dd
sha512: 8dea2e66ee8b0a8abd5035d0df64558739ec7846a4a5af91bfba5db9b7bcee734b0f4ee5c53cfaf0dbc67334ce70bf0d4cb238f86f857fd5bb6a71f18cab9fe8
ssdeep: 6144:9BLYgOQjWu4fVQTXWDQa72eEcwJ81y5HdtJlDQa72eEcwJv:9BXOQjP4tQKDQa72/J81yFJlDQa72/Jv
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1A264BD4953137B44FBB5057211A5D37E13A82E9A183D3A397E23A871FEEFE843C494A1
sha3_384: f1f11f6f2650ad4faf2d3c79fd308cec471099a96978ddd02499ba9f4055562345baef8fcaafcbf772ccd935ee9a9921
ep_bytes: be7b6e5fd909f921cf83ec04c70424d8
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lckh also known as:

LionicTrojan.Win32.Razy.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.900994
FireEyeGeneric.mg.536d7a635deabfa7
ALYacGen:Variant.Razy.900994
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
BitDefenderGen:Variant.Razy.900994
K7GWTrojan ( 00577ea11 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZexaF.34160.uuZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DA622
Paloaltogeneric.ml
KasperskyTrojan.Win32.Copak.lckh
AlibabaTrojan:Win32/Copak.f0a7bba3
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
RisingTrojan.Injector!1.CD26 (RDMK:cmRtazojJDrMKfcGSrv4lKqM4nTL)
Ad-AwareGen:Variant.Razy.900994
SophosMal/Generic-R + Troj/Agent-BGOS
TrendMicroTROJ_GEN.R002C0DA622
McAfee-GW-EditionBehavesLike.Win32.Generic.fc
EmsisoftGen:Variant.Razy.900994 (B)
JiangminTrojan.Copak.bkzu
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=85)
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftTrojan:Win32/Glupteba.DB!MTB
GDataGen:Variant.Razy.900994
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
McAfeeArtemis!536D7A635DEA
MalwarebytesTrojan.Crypt
PandaTrj/CI.A
APEXMalicious
TencentTrojan.Win32.Copak.wd
YandexTrojan.Copak!aH0V8Y9vMLU
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.35deab
AvastWin32:Trojan-gen

How to remove Trojan.Win32.Copak.lckh?

Trojan.Win32.Copak.lckh removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment