Trojan

Should I remove “Trojan.Win32.Copak.lexx”?

Malware Removal

The Trojan.Win32.Copak.lexx is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lexx virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location

How to determine Trojan.Win32.Copak.lexx?


File Info:

name: 215ABACBE78262E5A5DC.mlw
path: /opt/CAPEv2/storage/binaries/49cdd7fde09f6bc506f896339fdd5689e14cc5ac6953f360cef09b06e3c3e60c
crc32: 260047AD
md5: 215abacbe78262e5a5dc4ec0b1f9fcd0
sha1: e2740f6c2435b079706f156f5adbf7700334cdb9
sha256: 49cdd7fde09f6bc506f896339fdd5689e14cc5ac6953f360cef09b06e3c3e60c
sha512: 2478444e888efc34053af76cc1a1c70139c5ac29fb35f23df766b9eadb3b4850cfa035ea85776ab723c57ab2e7fa5f422112852859d861c9e7d5f5af8642bc33
ssdeep: 98304:XBk+g8po/Wk+g8aBOk+g8po/Wk+g8yk+g8po/Wk+g8aBOk+g8po/Wk+g8Q:XBk+pouk+8Ok+pouk+yk+pouk+8Ok+pQ
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1FFE50251A906899FFCCECB346DFBB1811E3C50D2A8D930EF9BE63E5A4317011C6DA661
sha3_384: c6c7a12be5bc57b98df8825756c57dea0e16e03758cdb481e6e3ab043f45af9b4c0378bde5cdb21f0c22e8cf769301e5
ep_bytes: be21630b9240683cea285c5f68d88540
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lexx also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.870640
FireEyeGeneric.mg.215abacbe78262e5
CAT-QuickHealTrojan.Copak
ALYacGen:Variant.Razy.870640
CylanceUnsafe
ZillyaTrojan.Injector.Win32.1325952
K7AntiVirusTrojan ( 00577ea11 )
K7GWTrojan ( 00577ea11 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaGen:NN.ZexaF.34114.ixZ@aSwc1te
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
ClamAVWin.Malware.Razy-9916821-0
KasperskyTrojan.Win32.Copak.lexx
BitDefenderGen:Variant.Razy.870640
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Trojan-gen
TencentMalware.Win32.Gencirc.10cfb378
Ad-AwareGen:Variant.Razy.870640
SophosML/PE-A + Troj/Agent-BGOS
McAfee-GW-EditionBehavesLike.Win32.Glupteba.wc
EmsisoftGen:Variant.Razy.870640 (B)
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Razy.870640
JiangminTrojan.Copak.bmcc
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.334452C
ArcabitTrojan.Razy.DD48F0
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
McAfeeGenericRXGJ-XZ!D06877308A46
MAXmalware (ai score=84)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Injector
RisingTrojan.Injector!1.CD26 (RDMK:cmRtazqDHb5h3CyYFquVXGUCjZMt)
eGambitUnsafe.AI_Score_97%
FortinetW32/GenKryptik.CTNW!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.be7826
MaxSecureTrojan.Malware.121218.susgen

How to remove Trojan.Win32.Copak.lexx?

Trojan.Win32.Copak.lexx removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment