Trojan

How to remove “Trojan.Win32.Copak.mgkn”?

Malware Removal

The Trojan.Win32.Copak.mgkn is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.mgkn virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.mgkn?


File Info:

name: 6DF76A0C1112BA755FB9.mlw
path: /opt/CAPEv2/storage/binaries/8b39fa8969534df7eb2f656430d227df2b267c543e08cf1c30ff0ffffe5b2e9f
crc32: 466E6CF5
md5: 6df76a0c1112ba755fb93e76cbe9abeb
sha1: 58a7921cd7ce512d4f13a724c6c698eea794493d
sha256: 8b39fa8969534df7eb2f656430d227df2b267c543e08cf1c30ff0ffffe5b2e9f
sha512: f4afd11b00f9ccfa31ded74c4fe42b2a4c5b9d8d7c0e2def8001658e5f9dc7ec385458e7657d7d127dbd226d8e8da9b3efeb766d5bef86bfb61f4029a22813fa
ssdeep: 1536:CjiS7cJXvuzjCUOjzZ1VNoJM8FhrqHLu/TPSRYzxW11JMaLyEbtkqX43CfGD+LfJ:jKklHqC1eiPoDAUy
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T13A83BE1AE0ABC346C4730D7ADD162FD377AFE86124EB5892862E000D9EDDF093D4995E
sha3_384: 86d22efd38390141ddf4de1ec24cec4ad63182bb33e6b8b09aab7baaaf0ef7b6899ea7608df43bb6d8dd2bb5ab3ae440
ep_bytes: 68dd357ae15981c3b5d8e94b68d88540
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.mgkn also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Trojan.Heur.fuX@IfSC5Sd
FireEyeGeneric.mg.6df76a0c1112ba75
McAfeeArtemis!6DF76A0C1112
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.470acc2c
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.c1112b
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
AvastWin32:Trojan-gen
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Copak.mgkn
BitDefenderGen:Trojan.Heur.fuX@IfSC5Sd
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
TencentMalware.Win32.Gencirc.10ce74a6
Ad-AwareGen:Trojan.Heur.fuX@IfSC5Sd
EmsisoftGen:Trojan.Heur.fuX@IfSC5Sd (B)
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DA722
McAfee-GW-EditionBehavesLike.Win32.Glupteba.mc
SophosML/PE-A + Troj/Agent-BGOS
GDataGen:Trojan.Heur.fuX@IfSC5Sd
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.334CCEE
GridinsoftRansom.Win32.Wacatac.sa
ArcabitTrojan.Heur.E78EFD
ViRobotTrojan.Win32.Z.Injector.82945.BRE
MicrosoftTrojan:Win32/Glupteba.DB!MTB
AhnLab-V3Malware/Win32.RL_Generic.R293305
BitDefenderThetaAI:Packer.4FFEE2691B
MAXmalware (ai score=87)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_GEN.R002C0DA722
RisingTrojan.Injector!1.CD26 (CLOUD)
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_92%
FortinetW32/Copak.AGMG!tr
AVGWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_90% (W)
MaxSecureTrojan.Malware.300983.susgen

How to remove Trojan.Win32.Copak.mgkn?

Trojan.Win32.Copak.mgkn removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment