Trojan

Trojan.Win32.Copak.mfhn removal guide

Malware Removal

The Trojan.Win32.Copak.mfhn is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.mfhn virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.mfhn?


File Info:

name: 3C3756CE943F2B719361.mlw
path: /opt/CAPEv2/storage/binaries/fe7c0c349c206bdd50522357ebe5859d7603344849ec62ed4668aeed13fda11c
crc32: 356A0FAE
md5: 3c3756ce943f2b719361861731d5419b
sha1: a3a2b916a21c9437570753ba1fa2a2063143dd7a
sha256: fe7c0c349c206bdd50522357ebe5859d7603344849ec62ed4668aeed13fda11c
sha512: e468588f6bcfaa6b435871d34a2fe8542b2eced51b2668954ecefaf91d50d7dfd4d03845fe1f75ea55061e7436be2325f6c5b5c9893dd1f2fe279f125c5da013
ssdeep: 3072:S/8ZXSKRJ4PHLcEZMvP2foNPPF1UOj1Br/vrnI:Si/0PHoEy39ljA
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T135F3E0136EE2C13BE04752F8CE80CDD1DEE95A5B665779359B9280CF18930AF8182DE7
sha3_384: 3b77bccd5dc55f76799c0466ed91505fb2ae1f25235d63edb89ddf985d3c9bd7b7a06a48445f0bf7601206a0058edc29
ep_bytes: bfb4c3160568d8854000680010400083
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.mfhn also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.865537
FireEyeGeneric.mg.3c3756ce943f2b71
ALYacGen:Variant.Razy.865537
CylanceUnsafe
SangforSuspicious.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Glupteba.7264dba6
K7GWTrojan ( 00577ea11 )
K7AntiVirusTrojan ( 00577ea11 )
BitDefenderThetaGen:NN.ZexaF.34114.kuZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DA722
KasperskyTrojan.Win32.Copak.mfhn
BitDefenderGen:Variant.Razy.865537
NANO-AntivirusTrojan.Win32.Copak.iwidug
AvastWin32:Trojan-gen
RisingTrojan.Kryptik!1.D284 (CLOUD)
Ad-AwareGen:Variant.Razy.865537
SophosML/PE-A + Troj/Agent-BGOS
TrendMicroTROJ_GEN.R002C0DA722
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
EmsisoftGen:Variant.Razy.865537 (B)
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Razy.865537
JiangminTrojan.Copak.blyg
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=87)
Antiy-AVLTrojan/Generic.ASMalwS.3340979
ArcabitTrojan.Razy.DD3501
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
McAfeeArtemis!3C3756CE943F
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
APEXMalicious
TencentMalware.Win32.Gencirc.10ce8307
YandexTrojan.Copak!e82t+1NzsPs
IkarusWin32.Outbreak
eGambitUnsafe.AI_Score_98%
FortinetW32/Copak.AGMG!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.e943f2
MaxSecureTrojan.Malware.300983.susgen

How to remove Trojan.Win32.Copak.mfhn?

Trojan.Win32.Copak.mfhn removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment