Trojan

Trojan.Win32.Copak.letd (file analysis)

Malware Removal

The Trojan.Win32.Copak.letd is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.letd virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.letd?


File Info:

name: 944262EB8ED8ACCA9078.mlw
path: /opt/CAPEv2/storage/binaries/abe37118f6a40eca1dc221a24b146a2f2de6aa9fbb092e68cf71e60c54b28537
crc32: B4CEABDA
md5: 944262eb8ed8acca9078989b5aba178e
sha1: e117f0a41a940018ec012331aac49506a52280bc
sha256: abe37118f6a40eca1dc221a24b146a2f2de6aa9fbb092e68cf71e60c54b28537
sha512: 0c1b0e6a738b43cfcbcf6c4652ac6340be1470a8634b22e70b588976a810505850d7f1a90f9f6bd229f62cb9dab19a0eb140a6307c80bbb83bc9651ad4866c6b
ssdeep: 3072:xmLCfUs40QeEKPWZNXWYb1y0bNE2nclsCzIqnrf5lTNwHvldu:xIsDQeEyIyw/rCzdrf5lyH6
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T108F3E0A56EC51495F5579C31AF4BB39ECAB11A1A37FC300AF8BD122084F611F52EE623
sha3_384: 9f40b49b023deafdcfef9d1473d47be64ea519e910ce831afea411bb2e4a431096e25214736254003824922654bdf19d
ep_bytes: 83ec04c70424efb9e3155b68d8854000
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.letd also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.900994
FireEyeGeneric.mg.944262eb8ed8acca
ALYacGen:Variant.Razy.900994
CylanceUnsafe
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaTrojan:Win32/Copak.889ba0f2
K7GWTrojan ( 00577ea11 )
K7AntiVirusTrojan ( 00577ea11 )
BitDefenderThetaGen:NN.ZexaF.34160.kuZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DA822
AvastWin32:Trojan-gen
KasperskyTrojan.Win32.Copak.letd
BitDefenderGen:Variant.Razy.900994
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
TencentTrojan.Win32.Copak.wd
Ad-AwareGen:Variant.Razy.900994
EmsisoftGen:Variant.Razy.900994 (B)
TrendMicroTROJ_GEN.R002C0DA822
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
SophosMal/Generic-R + Troj/Agent-BGOS
Paloaltogeneric.ml
GDataGen:Variant.Razy.900994
JiangminTrojan.Copak.bmmw
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Win32.Injector
ArcabitTrojan.Razy.DDBF82
ViRobotTrojan.Win32.Z.Copak.165889.WI
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
McAfeeArtemis!944262EB8ED8
MAXmalware (ai score=80)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
APEXMalicious
RisingTrojan.Injector!1.CD26 (CLOUD)
YandexTrojan.Copak!je5s98oy7XA
SentinelOneStatic AI – Malicious PE
FortinetW32/Copak.AGMG!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.b8ed8a
PandaTrj/CI.A

How to remove Trojan.Win32.Copak.letd?

Trojan.Win32.Copak.letd removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment