Trojan

Trojan.Win32.Copak.magx (file analysis)

Malware Removal

The Trojan.Win32.Copak.magx is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.magx virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.magx?


File Info:

name: 3AF293D62F959C1D57C6.mlw
path: /opt/CAPEv2/storage/binaries/d30429c1859e77b2d64d0f6ad9d465ea109b6cad48759595a82cd56273bcfe11
crc32: 4A2B6D3D
md5: 3af293d62f959c1d57c6b18dd4c0682b
sha1: aa1b58b8dc1d974fb338a0e99bcc1f73686f09c8
sha256: d30429c1859e77b2d64d0f6ad9d465ea109b6cad48759595a82cd56273bcfe11
sha512: f2738b0f14c468e01928a3c0ab19a2cccb929062363b141af4e033681be90d9aad1553dd21b7b2d681cb1cbf08fd0577d0f510208da56df5d7518f9645008079
ssdeep: 1536:78q3Il2ZnO63HHH3iK0eZUn3mvGGWSlIkUu422Q0vwzV81fs1sn/fHNqZvP8CeRt:7JIcI3mtlIr6uvEOW1W/VqZvP8yo
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T17483BF06EF530629D47C85F269493C992BE6075B2C40CE8BCE80A7944D62775FE4A8BE
sha3_384: 5126682b322f2cbbf2a8b181b4a062639178544c329098931100cf107a730938bccfb8541253dacdb565b870f6d3e761
ep_bytes: bab46089a483ec04c70424d885400021
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.magx also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Trojan.Heur.fuX@IfSC5Sd
FireEyeGeneric.mg.3af293d62f959c1d
McAfeeArtemis!3AF293D62F95
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Glupteba.8416a1b3
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.62f959
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
AvastWin32:Trojan-gen
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Copak.magx
BitDefenderGen:Trojan.Heur.fuX@IfSC5Sd
TencentMalware.Win32.Gencirc.11c5f183
Ad-AwareGen:Trojan.Heur.fuX@IfSC5Sd
SophosML/PE-A + Troj/Agent-BGOS
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DA522
McAfee-GW-EditionBehavesLike.Win32.Glupteba.mc
EmsisoftGen:Trojan.Heur.fuX@IfSC5Sd (B)
GDataGen:Trojan.Heur.fuX@IfSC5Sd
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.3372BA2
MicrosoftTrojan:Win32/Glupteba.DB!MTB
AhnLab-V3Malware/Win32.RL_Generic.R293305
BitDefenderThetaAI:Packer.4FFEE2691B
ALYacGen:Trojan.Heur.fuX@IfSC5Sd
MAXmalware (ai score=85)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_GEN.R002C0DA522
RisingTrojan.Kryptik!1.BF57 (CLOUD)
YandexTrojan.Injector!90dLkk6bp7A
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Copak.magx?

Trojan.Win32.Copak.magx removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment