Trojan

Trojan.Win32.Copak.lhgy information

Malware Removal

The Trojan.Win32.Copak.lhgy is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lhgy virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.lhgy?


File Info:

name: E57C4D56C95F9D3011BD.mlw
path: /opt/CAPEv2/storage/binaries/1e7ef1a5ad93cb37b95afca356385c7ebeec4fce56867a22c2df7ed40a45f7d2
crc32: D18EE4ED
md5: e57c4d56c95f9d3011bdeff4060570fe
sha1: 5a7238132799a64f942520ddd953bede7acdb86c
sha256: 1e7ef1a5ad93cb37b95afca356385c7ebeec4fce56867a22c2df7ed40a45f7d2
sha512: 208180382377205cdcaaca8e56a67ad3f7af37f831a63df61ec91810ce54838f33ae22a2823fe34d018745a863e1ba2cff4135aa8033f9724959c3c4426e505d
ssdeep: 24576:yjLbcKc9eZsvSvtsTWA9GZyhqAWZsvSvtsTWA9G9:xKPMKsS8tUMKsS8U
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1BE0501FF3AF3A0D2CF566C39C120C53B1A752D16766E802FBAE1B841967147FDA10968
sha3_384: d1be52448cb9245b8dd7dd8e1c423c3f84b9ee10f4e8ccc8ba0d560d53480d86fd96d9a3ffad5f37e101d04f55568124
ep_bytes: 6892a55f7c584f68d885400081ebcd23
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lhgy also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.870640
FireEyeGeneric.mg.e57c4d56c95f9d30
ALYacGen:Variant.Razy.870640
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.595893aa
K7GWTrojan ( 00577ea11 )
CrowdStrikewin/malicious_confidence_90% (W)
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
AvastWin32:Evo-gen [Susp]
KasperskyTrojan.Win32.Copak.lhgy
BitDefenderGen:Variant.Razy.870640
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
TencentMalware.Win32.Gencirc.10cfbb40
Ad-AwareGen:Variant.Razy.870640
EmsisoftGen:Variant.Razy.870640 (B)
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DAA22
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
SophosML/PE-A + Troj/Agent-BGOS
GDataGen:Variant.Razy.870640
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.34F4976
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
Acronissuspicious
McAfeeArtemis!E57C4D56C95F
MAXmalware (ai score=84)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Injector
TrendMicro-HouseCallTROJ_GEN.R002C0DAA22
RisingTrojan.Injector!1.CD26 (CLOUD)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/GenKryptik.CTNW!tr
BitDefenderThetaGen:NN.ZexaF.34114.YuZ@aSwc1te
AVGWin32:Evo-gen [Susp]
Cybereasonmalicious.6c95f9

How to remove Trojan.Win32.Copak.lhgy?

Trojan.Win32.Copak.lhgy removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment