Trojan

What is “Trojan.Win32.Copak.lznf”?

Malware Removal

The Trojan.Win32.Copak.lznf is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.lznf virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.lznf?


File Info:

name: 3CE6C0C030846B571138.mlw
path: /opt/CAPEv2/storage/binaries/88e7ebf3fa826a8752d9da679b739846b62738f8686ba73cdbcabd518da05c21
crc32: B38146F9
md5: 3ce6c0c030846b571138d4be3b086f0d
sha1: cebab746ef61e9c2c20f7506a6afbbcf4cbbd1d6
sha256: 88e7ebf3fa826a8752d9da679b739846b62738f8686ba73cdbcabd518da05c21
sha512: ad2504687cae61b632cf4b5a9459060617d5f52ec9a3945ee1a70bf8a222552ab35fc3ee8dd3a913404b5ba342092cad1ade1f591d56901b1169f36d0e77bf69
ssdeep: 3072:EK/wvxrIxrxndyZQR1eEUc4aaHrpXFkq8Fj1tgV2tj6xyhwD5N1un00:up0xVbRqHHNyhgVUQXM00
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1ECF3DFAF5033C00FE1B8FAB94BA82DE5CE6E7E5375E7542097321B1880244D77DAB466
sha3_384: 8b2788e37e7edeabaaefd8eed65496b5134904c9b724f423e9d295c2c6751599c90001261eba0909c6b45d2b4612025f
ep_bytes: b89cbcc1e068d8854000680010400029
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.lznf also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.865537
FireEyeGeneric.mg.3ce6c0c030846b57
McAfeeArtemis!3CE6C0C03084
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.1eec18b6
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.030846
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
KasperskyTrojan.Win32.Copak.lznf
BitDefenderGen:Variant.Razy.865537
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Evo-gen [Susp]
TencentTrojan.Win32.Copak.wa
Ad-AwareGen:Variant.Razy.865537
SophosMal/Generic-R + Troj/Agent-BGOS
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DA522
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
EmsisoftGen:Variant.Razy.865537 (B)
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Razy.865537
JiangminTrojan.Copak.bmsf
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.332DEBE
ViRobotTrojan.Win32.Z.Razy.165889.DVA
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
BitDefenderThetaGen:NN.ZexaF.34114.kuZ@aeSC5Sd
ALYacGen:Variant.Razy.865537
MAXmalware (ai score=88)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_GEN.R002C0DA522
RisingTrojan.Injector!1.CD26 (RDMK:cmRtazpNZNluclylFkiaYB0elLBu)
IkarusTrojan.Win32.Injector
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Evo-gen [Susp]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Copak.lznf?

Trojan.Win32.Copak.lznf removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment