Trojan

How to remove “Trojan.Win32.Copak.lemb”?

Malware Removal

The Trojan.Win32.Copak.lemb is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lemb virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location

How to determine Trojan.Win32.Copak.lemb?


File Info:

name: 3D777D9A6469602540B1.mlw
path: /opt/CAPEv2/storage/binaries/a130d2b1119482c4a6283f90a365efdbfe7611bcb57246a04964d52c23e11eba
crc32: C81E1054
md5: 3d777d9a6469602540b1491eccf36f4e
sha1: 54e6f6fb908369d5783509f5eac385a2a0db73e3
sha256: a130d2b1119482c4a6283f90a365efdbfe7611bcb57246a04964d52c23e11eba
sha512: 0b5b2496a2c9efa4ab031486c5a72aaf6585968f0fdbc1228e3f2d6353a032c6c29672cc57d08cc0304f7a71f0f3732e0ffa2adc7115a2272d86c8faf34c7f2a
ssdeep: 3072:8rO6zL1bH6afnmeyTl+dqnTiJ37Ry9RP++IEdqjqDZRYgqrJRt5c:SO6zLzPkWqnTiJ3Nmhg3PQ
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1C3F3CF5166D7506ADC217832A051ADE44ABDDC867C07F6EB9AE813CA07DA2DDCB31CF0
sha3_384: 599ad1723fb1955386134ab4336fe52cc0db2d1932bcd7a613b13d71e190c01af0ab539623c01c20c75e4293f29a9160
ep_bytes: ba53a9bcae21db68d88540004f680010
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lemb also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.865537
FireEyeGeneric.mg.3d777d9a64696025
McAfeeGlupteba-FTSD!3D777D9A6469
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.7e0b3848
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.a64696
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Packed.Razy-9936825-0
KasperskyTrojan.Win32.Copak.lemb
BitDefenderGen:Variant.Razy.865537
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Evo-gen [Susp]
TencentTrojan.Win32.Copak.wd
Ad-AwareGen:Variant.Razy.865537
SophosMal/Generic-R + Troj/Agent-BGOS
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DA622
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
EmsisoftGen:Variant.Razy.865537 (B)
GDataGen:Variant.Razy.865537
JiangminTrojan.Copak.bmeq
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Win32.Injector
GridinsoftRansom.Win32.Wacatac.sa
ArcabitTrojan.Razy.DD3501
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
BitDefenderThetaGen:NN.ZexaF.34160.kuZ@aeSC5Sd
ALYacGen:Variant.Razy.865537
MAXmalware (ai score=83)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_GEN.R002C0DA622
RisingTrojan.Injector!1.CD26 (RDMK:cmRtazrs0Q8Dd4htwB69De4A014z)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Evo-gen [Susp]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Copak.lemb?

Trojan.Win32.Copak.lemb removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment