Trojan

Trojan.Win32.Copak.lcxa removal instruction

Malware Removal

The Trojan.Win32.Copak.lcxa is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lcxa virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.lcxa?


File Info:

name: 1F411136DCFD16CAC330.mlw
path: /opt/CAPEv2/storage/binaries/61874a83c47d284098bb8a7bd0ef02721d680001354ae5c007bdc67253da5165
crc32: F29A1488
md5: 1f411136dcfd16cac3305aa0653096b8
sha1: 36358f4a1f5ec87378c4144c3fab125ffafb09b7
sha256: 61874a83c47d284098bb8a7bd0ef02721d680001354ae5c007bdc67253da5165
sha512: 39ca77bee5a5e51d61aa4e983177a881870f3b46009405cfb0ebaf00ef437222aad08ea3ce79b2dad71dd426834f61399133f9c7c12888cd52ba852df91c7c92
ssdeep: 6144:4B6mknKG9SN+qEWMHZOT6Q9e1nCbcHFhjitrY+qEWMHZOTs:PyG9SNmWun7n+6GtrYmWu3
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1D664CE9C2ABAD54CD34270301D2F7551FB2754C2B24A672E8E2B57219F93DCC6B818AF
sha3_384: da030db20c22406283028c106f1681728d30d8429b889fe4fd35cec324fe5086757d1aa1efde88c08928c180ba6348d8
ep_bytes: bb11645a7c81c73a0d1e584e68d88540
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lcxa also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.900994
FireEyeGeneric.mg.1f411136dcfd16ca
McAfeeGlupteba-FTSD!1F411136DCFD
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.63cd8b95
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.6dcfd1
BitDefenderThetaGen:NN.ZexaF.34160.uuZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DAA22
AvastWin32:Trojan-gen
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Copak.lcxa
BitDefenderGen:Variant.Razy.900994
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
TencentTrojan.Win32.Copak.wa
Ad-AwareGen:Variant.Razy.900994
EmsisoftGen:Variant.Razy.900994 (B)
TrendMicroTROJ_GEN.R002C0DAA22
McAfee-GW-EditionBehavesLike.Win32.Glupteba.fc
SophosML/PE-A + Troj/Agent-BGOS
Paloaltogeneric.ml
GDataGen:Variant.Razy.900994
JiangminTrojan.Generic.hekvg
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.3355E61
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftTrojan:Win32/Glupteba.DB!MTB
AhnLab-V3Malware/Win32.RL_Generic.R293305
VBA32BScope.Trojan.Wacatac
ALYacGen:Variant.Razy.900994
MAXmalware (ai score=80)
MalwarebytesTrojan.Crypt
APEXMalicious
RisingTrojan.Injector!1.CD26 (CLOUD)
YandexTrojan.Copak!cXAq+GJKnLY
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Trojan.Win32.Copak.lcxa?

Trojan.Win32.Copak.lcxa removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment