Trojan

How to remove “Trojan.Win32.Copak.mkyv”?

Malware Removal

The Trojan.Win32.Copak.mkyv is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.mkyv virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.mkyv?


File Info:

name: 77460C997675C59BDA71.mlw
path: /opt/CAPEv2/storage/binaries/551c37fdb9e4a177c85e2e3ce3856f5eb37a99e01fb2ed0235ee0ec6273eb408
crc32: 91D4738C
md5: 77460c997675c59bda71a860b49778d2
sha1: 6a34e85bc6693a41f95cb8f2c3c940986ce39d2c
sha256: 551c37fdb9e4a177c85e2e3ce3856f5eb37a99e01fb2ed0235ee0ec6273eb408
sha512: 349b884cb47f5ceba2df309cde0c54b5007e5b7846ae5d214d7ea12a74cecd5d760658dde4b717576345cd9cb2e7b0746a3824e71d824573549d7ac5bbf91346
ssdeep: 3072:AmLGs8YpDqVJ32dUNyzBQWvgUg8OZ08Ply5rKabpfvmIN3vzQMeyrB0luXfx:AP8EIgJWIUg3Rty5rKabcINLQseqx
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T184F3CF1096E39426F7467B31E26DE7CD123D376150A671DFCF6A74B42CE881E07A48B2
sha3_384: 99f977635d07cb633e05201b1b85d0f1a4fee5829f51e5e4ed7763d39bfcdc26ca59102081381bd1b6a58cd5105e28c9
ep_bytes: 83ec04c704240b68fccf8b142483c404
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.mkyv also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.865537
FireEyeGeneric.mg.77460c997675c59b
McAfeeArtemis!77460C997675
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Copak.a9575f0c
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.97675c
BitDefenderThetaGen:NN.ZexaF.34114.kuZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DA922
ClamAVWin.Malware.Razy-9928615-0
KasperskyTrojan.Win32.Copak.mkyv
BitDefenderGen:Variant.Razy.865537
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Evo-gen [Susp]
TencentTrojan.Win32.Copak.wa
Ad-AwareGen:Variant.Razy.865537
SophosML/PE-A + Troj/Agent-BGOS
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DA922
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
EmsisoftGen:Variant.Razy.865537 (B)
APEXMalicious
GDataGen:Variant.Razy.865537
JiangminTrojan.Copak.bqeb
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=88)
Antiy-AVLTrojan/Generic.ASMalwS.33867B5
ArcabitTrojan.Razy.DD3501
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
ALYacGen:Variant.Razy.865537
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Crypt
RisingTrojan.Injector!1.CD26 (CLOUD)
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetW32/Copak.AGMG!tr
AVGWin32:Evo-gen [Susp]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Copak.mkyv?

Trojan.Win32.Copak.mkyv removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment