Trojan

Trojan.Win32.Copak.lmik removal tips

Malware Removal

The Trojan.Win32.Copak.lmik is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lmik virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.lmik?


File Info:

name: A71239B4CA84A4870377.mlw
path: /opt/CAPEv2/storage/binaries/d2dcdc21fe459a002b79da05bee7c148f8d16215b929d1b4b484d6fcf85a146e
crc32: 3C9A920B
md5: a71239b4ca84a4870377d66fb86ce629
sha1: 170fde9445c2f30951d97abd2cf1a3060631a12f
sha256: d2dcdc21fe459a002b79da05bee7c148f8d16215b929d1b4b484d6fcf85a146e
sha512: fc57fa4ce2bb77980e191f8abd0176d9d739a72d481ba8785abff6f806a9135bfdb11165f247859793757f63eb6a99ccdaa643147be143b126f96a9bc63e63bc
ssdeep: 6144:TIhMK5e0VddUJU7fH2WvN28ZXWEQxLVWY0aOPoFvgtYdnN7fH2WvN28ZXWE:0p55UJU7fJF2omdWYtWodgtYdnN7fJFR
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T14064CEFB0CB713F2E183C53B97D38AB929B5403AAAE807D5C2505B25CF53E38046562A
sha3_384: 99d01a1292b1e8c62bbc8bd1913fb65cfeb482a706b0097cbd5ecf36afc20dfb9fd066add42563dd4a2b676d09df42d5
ep_bytes: b859d2924721fb68d885400083ec0489
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lmik also known as:

LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.900994
FireEyeGeneric.mg.a71239b4ca84a487
McAfeeGlupteba-FTSD!A71239B4CA84
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.29e61042
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.4ca84a
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
AvastWin32:Evo-gen [Susp]
ClamAVWin.Packed.Iboz-9877872-0
KasperskyTrojan.Win32.Copak.lmik
BitDefenderGen:Variant.Razy.900994
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
TencentTrojan.Win32.Copak.wd
Ad-AwareGen:Variant.Razy.900994
SophosMal/Generic-S + Troj/Agent-BGOS
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DAM22
McAfee-GW-EditionBehavesLike.Win32.Glupteba.fc
EmsisoftGen:Variant.Razy.900994 (B)
GDataGen:Variant.Razy.900994
JiangminTrojan.Copak.bnfg
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.332A8E0
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
BitDefenderThetaGen:NN.ZexaF.34160.uuZ@aeSC5Sd
ALYacGen:Variant.Razy.900994
MAXmalware (ai score=89)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_GEN.R002C0DAM22
RisingTrojan.Injector!1.CD26 (CLOUD)
YandexTrojan.Copak!SM9edZh+JD8
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.121218.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Evo-gen [Susp]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Copak.lmik?

Trojan.Win32.Copak.lmik removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment