Trojan

What is “Trojan.Win32.Copak.mlhm”?

Malware Removal

The Trojan.Win32.Copak.mlhm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.mlhm virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location

How to determine Trojan.Win32.Copak.mlhm?


File Info:

name: 699615EB262B6BCFC493.mlw
path: /opt/CAPEv2/storage/binaries/370a9bf9d098b47ed278eb4c5775133f18a30ff1301aed33cec3a1758b852228
crc32: 2E462ABC
md5: 699615eb262b6bcfc493478d2b9b5c1a
sha1: 3d058030d42793d952073fde6b27e5ed18d72822
sha256: 370a9bf9d098b47ed278eb4c5775133f18a30ff1301aed33cec3a1758b852228
sha512: 7d232574be18b81d1572f6af9b4daaa569e1f744afb597b8752fab4ac5f69a53c325d785fc1d78de150493b44dfedaa32f6d03574b2c7f300cf2b919a9a750e2
ssdeep: 12288:uRIuy4aAhZgwpTB3dWDVMXWzhnLhoJ81E1sFk92XMgLew:EyFAhm2TNvACPZ28gLew
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T15BB4F13C8646F34BF0F821FFE6DC1D6C826E542234CC1A96A265CFDA259705A13B5E93
sha3_384: 1d1c4d041fb651125067a41f9288d23aed8526c58c9bb48882e5c3a2aaf7f6115dad78cce6b82ec1a3287c4caa17f023
ep_bytes: b8a77e6fba81c6d2f6f85683ec04c704
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.mlhm also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.870640
McAfeeGlupteba-FTSD!699615EB262B
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0058e60a1 )
K7GWTrojan ( 0058e60a1 )
CrowdStrikewin/malicious_confidence_100% (D)
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
KasperskyTrojan.Win32.Copak.mlhm
BitDefenderGen:Variant.Razy.870640
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Trojan-gen
TencentTrojan.Win32.Copak.za
Ad-AwareGen:Variant.Razy.870640
EmsisoftGen:Variant.Razy.870640 (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.Siggen14.7487
ZillyaTrojan.Injector.Win32.1438731
McAfee-GW-EditionBehavesLike.Win32.Glupteba.hc
Trapminemalicious.moderate.ml.score
FireEyeGeneric.mg.699615eb262b6bcf
SophosML/PE-A + Troj/Agent-BGOS
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Copak.cfqc
AviraTR/Dropper.Gen
MicrosoftTrojan:Win32/Glupteba.DB!MTB
ArcabitTrojan.Razy.DD48F0
ZoneAlarmTrojan.Win32.Copak.mlhm
GDataGen:Variant.Razy.870640
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34712.GuZ@aOhSZ5
ALYacGen:Variant.Razy.870640
MAXmalware (ai score=81)
VBA32BScope.Trojan.Wacatac
MalwarebytesTrojan.Downloader
RisingTrojan.Injector!1.CD26 (CLASSIC)
IkarusTrojan.Win32.Glupteba
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenKryptik.CTNW!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.b262b6

How to remove Trojan.Win32.Copak.mlhm?

Trojan.Win32.Copak.mlhm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment