Trojan

Trojan.Win32.Copak.lykh malicious file

Malware Removal

The Trojan.Win32.Copak.lykh is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lykh virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.lykh?


File Info:

name: 82F4AFF222389A72AC79.mlw
path: /opt/CAPEv2/storage/binaries/a65594c94a2c43f064b274cf5d3f518ce72336bf0f156982970c8695f6789f0e
crc32: B6C05D17
md5: 82f4aff222389a72ac79df7e6e87c6d3
sha1: c4cc346da2b7d18faa0a0c98b9ccbb1f34857a07
sha256: a65594c94a2c43f064b274cf5d3f518ce72336bf0f156982970c8695f6789f0e
sha512: a9a92ede15f70f84cd8e52d1240e336edc7f724f01fff761ddede5ebae9dabf34f9cae5544f621ff516502a3f26d3b0b689b5baf47c39c5772571fd6d6937438
ssdeep: 3072:jr0MRheZCbOOInNPm2gGjWsp3IB2eyi7IVJVw/4hJQUWBupOJdLRuUbEx9VqhiAw:8QENu2gGyshI4Bi8Vs4D0ZdLR6Vq8ArE
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T183F3CF19C903ECB1E3D2FCB66BB41347F4AE11A2B9E8564B9AF5515CB15138D12B8F30
sha3_384: b3496ab4ad0ef4ee50000dcc67d5c78e419996e25260955e669ea23f973e93c6e7dc913e3d38b89ca3be3bb2c015be79
ep_bytes: 6875a886f28b142483c40429cf29f783
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lykh also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.900994
FireEyeGeneric.mg.82f4aff222389a72
ALYacGen:Variant.Razy.900994
CylanceUnsafe
ZillyaTrojan.Copak.Win32.160834
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.0b7c73dc
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.222389
BitDefenderThetaGen:NN.ZexaF.34114.kuZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
AvastWin32:Evo-gen [Susp]
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Copak.lykh
BitDefenderGen:Variant.Razy.900994
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
TencentMalware.Win32.Gencirc.10cfd4a5
Ad-AwareGen:Variant.Razy.900994
EmsisoftGen:Variant.Razy.900994 (B)
TrendMicroTROJ_GEN.R002C0DA622
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
SophosML/PE-A + Troj/Agent-BGOS
Paloaltogeneric.ml
GDataWin32.Trojan.Agent.KZLFKF
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.333A0B5
GridinsoftRansom.Win32.Wacatac.sa
ViRobotTrojan.Win32.Z.Razy.165890.AQO
MicrosoftTrojan:Win32/Glupteba.DB!MTB
AhnLab-V3Malware/Win32.RL_Generic.R293305
McAfeeArtemis!82F4AFF22238
MAXmalware (ai score=83)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_GEN.R002C0DA622
RisingTrojan.Kryptik!1.BF57 (RDMK:cmRtazrX/teFtJPU9oF6hzjs1ABv)
YandexTrojan.Copak!Op4oaasv3ao
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_60%
FortinetW32/Copak.AGMG!tr
AVGWin32:Evo-gen [Susp]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Copak.lykh?

Trojan.Win32.Copak.lykh removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment