Trojan

What is “Trojan.Win32.Copak.lhli”?

Malware Removal

The Trojan.Win32.Copak.lhli is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lhli virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.lhli?


File Info:

name: 1F27484B9588B316FA6A.mlw
path: /opt/CAPEv2/storage/binaries/7dc62b325267f8f7895ebbfec35b8571f52cd92165f08801ad3eca48d48a0154
crc32: 10D3A74C
md5: 1f27484b9588b316fa6a6d495c6859e5
sha1: 4b0670fe3f44e401d6c8d013aa234ce49fb9403e
sha256: 7dc62b325267f8f7895ebbfec35b8571f52cd92165f08801ad3eca48d48a0154
sha512: 45305a43c959f54b812b90ee408ee7eecc791f599371fd7ea68e6258f132f4d7fa2ce1c17e1d3d76b18ff584937dc0098bd74dfb1a9c4defe3190cfd38427db8
ssdeep: 98304:xxn6b/6co3WC6b/6j6b/6co3WC6b/6oNR6b/6co3WC6b/6j6b/6co3WC6b/6M:x0biP3ybiGbiP3ybioKbiP3ybiGbiP3M
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T18106CE2C50663DCFF324F4306B053F880EDA415A76CE76BAE60502E19F769A736A4F94
sha3_384: aa246248047a3b4401672f0cf0052c49d8be462cef847fe233cd7ac7b65d719762022077a572463d41c7d03ebb782922
ep_bytes: bacedc3bb968d885400009f781c7a01d
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lhli also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.900994
FireEyeGeneric.mg.1f27484b9588b316
McAfeeGlupteba-FTSD!1F27484B9588
CylanceUnsafe
ZillyaTrojan.Injector.Win32.1472028
SangforTrojan.Win32.Copak.lhli
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Glupteba.670ccadb
K7GWTrojan ( 00577ea11 )
CrowdStrikewin/malicious_confidence_100% (W)
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Malware.Razy-9916489-0
KasperskyTrojan.Win32.Copak.lhli
BitDefenderGen:Variant.Razy.900994
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Trojan-gen
TencentTrojan.Win32.Copak.wd
SophosMal/Generic-S + Troj/Agent-BGOS
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DAS22
McAfee-GW-EditionBehavesLike.Win32.RAHack.wc
EmsisoftGen:Variant.Razy.900994 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Copak.bigr
AviraTR/Injector.fcmpu
Antiy-AVLTrojan/Generic.ASMalwS.350DD89
MicrosoftTrojan:Win32/Glupteba.DB!MTB
GDataGen:Variant.Razy.900994
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
BitDefenderThetaGen:NN.ZexaF.34182.ZxZ@aeSC5Sd
ALYacGen:Variant.Razy.900994
MAXmalware (ai score=88)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_GEN.R002C0DAS22
RisingTrojan.Injector!1.CD26 (CLOUD)
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.b9588b
PandaTrj/CI.A

How to remove Trojan.Win32.Copak.lhli?

Trojan.Win32.Copak.lhli removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment