Trojan

Trojan.Win32.Copak.lflx removal guide

Malware Removal

The Trojan.Win32.Copak.lflx is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lflx virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Trojan.Win32.Copak.lflx?


File Info:

name: 65D773E9A26BB6C8C4F8.mlw
path: /opt/CAPEv2/storage/binaries/684cbae2e0570be004eecbd25b09165131b4c8cca332be9a8da953efb3816169
crc32: F94CA71D
md5: 65d773e9a26bb6c8c4f87a2f1675ca62
sha1: 54e838815bd54eabe1a3d100be15206f0f63b68d
sha256: 684cbae2e0570be004eecbd25b09165131b4c8cca332be9a8da953efb3816169
sha512: ef51470115c68a66e5be1b8e5a669ac2267fbd915b6ee420986d4a9a7d839bebbb903e2d6911142608e659e04e8eef1d8fa5fa16b6d1b8818b9bd99c9f8ac32c
ssdeep: 12288:jcLxJfpn/A2/csYcVYlz/aBHvqzzeryT08pq456fu7qaBXBHvqzzeryS:OZ/gtcawBHvq3GyR6W7qaBXBHvq3GyS
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1D6051224343A30D7F59300B81945BBA5293B2523239F5AF756DB79DB81F836B26D80BC
sha3_384: b3c5bdab3635dd7e4b1b484541b47a5d7cfa3a31c33e652c2fb20444b05fbd1fa4c8a6c44a763a82aabdacb431827930
ep_bytes: bfdf907a8d68d885400081c601000000
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lflx also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
CynetMalicious (score: 100)
FireEyeGeneric.mg.65d773e9a26bb6c8
ALYacGen:Variant.Razy.870640
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.1471e612
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.9a26bb
BitDefenderThetaGen:NN.ZexaF.34182.YuZ@aOhSZ5
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DAA22
Paloaltogeneric.ml
KasperskyTrojan.Win32.Copak.lflx
BitDefenderGen:Variant.Razy.870640
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
MicroWorld-eScanGen:Variant.Razy.870640
AvastWin32:Trojan-gen
TencentTrojan.Win32.Copak.wb
Ad-AwareGen:Variant.Razy.870640
SophosMal/Generic-R + Troj/Agent-BGOS
TrendMicroTROJ_GEN.R002C0DAA22
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
EmsisoftGen:Variant.Razy.870640 (B)
GDataGen:Variant.Razy.870640
JiangminTrojan.Copak.blmy
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.34FCC5A
GridinsoftRansom.Win32.Wacatac.sa
ZoneAlarmHEUR:Trojan.Win32.Copak.pef
MicrosoftTrojan:Win32/Glupteba.DB!MTB
AhnLab-V3Malware/Win32.RL_Generic.R293305
Acronissuspicious
McAfeeGlupteba-FTSD!65D773E9A26B
MAXmalware (ai score=84)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Downloader
APEXMalicious
RisingTrojan.Injector!1.CD26 (CLOUD)
YandexTrojan.Copak!IgYPETBK3VY
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/GenKryptik.CTNW!tr
AVGWin32:Trojan-gen
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan.Win32.Copak.lflx?

Trojan.Win32.Copak.lflx removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment