Trojan

Trojan.Win32.Copak.mypg information

Malware Removal

The Trojan.Win32.Copak.mypg is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.mypg virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.mypg?


File Info:

name: 1C0B84ACE19F12DA8763.mlw
path: /opt/CAPEv2/storage/binaries/22606a0f4709245702ba5bf165e0f42fb04d239f5e5464943b87191e7a6f2fcd
crc32: F6592488
md5: 1c0b84ace19f12da8763ea23a1a84af8
sha1: c359a5d32b7e64f182309be1d4f4bbc1509efa4e
sha256: 22606a0f4709245702ba5bf165e0f42fb04d239f5e5464943b87191e7a6f2fcd
sha512: c2801e9eeb96049db20c68f2e629c861ca77ec1d21522f52c88a53051bd6d575dbdb83512a2feedc7dbf0db694a0404d85aa15a0f042233e8a3669b61963e5fd
ssdeep: 3072:nzJfAlfDakuKwfrpsRZ1k0m83R77emXRbG4m4oHf264rMjNFQgMkP:RCDKWRzm8x7dG4Xwf1aa2nkP
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1D5F3DFBF18F950C5DB84553EE9AE8D888AF904F6A65803D30F97BA412F73D2D1C1B612
sha3_384: 9033fbede076afa25607532e14b176230d9a02428d9e396dc67d8e76a5f0179f85408d0ee82c02e3e99fe9a0ab1f5c60
ep_bytes: ba27023a7383ec04c70424d885400068
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.mypg also known as:

LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.900994
FireEyeGeneric.mg.1c0b84ace19f12da
ALYacGen:Variant.Razy.900994
MalwarebytesTrojan.Crypt
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Glupteba.81504017
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.ce19f1
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
APEXMalicious
AvastWin32:Evo-gen [Susp]
KasperskyTrojan.Win32.Copak.mypg
BitDefenderGen:Variant.Razy.900994
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
TencentTrojan.Win32.Copak.wa
Ad-AwareGen:Variant.Razy.900994
SophosML/PE-A + Troj/Agent-BGOS
DrWebTrojan.Siggen14.7487
TrendMicroTROJ_GEN.R002C0DAB22
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
EmsisoftGen:Variant.Razy.900994 (B)
GDataGen:Variant.Razy.900994
JiangminTrojan.Copak.bqku
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Generic.ASMalwS.3379271
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
McAfeeGlupteba-FTSD!1C0B84ACE19F
MAXmalware (ai score=80)
VBA32BScope.Trojan.Wacatac
CylanceUnsafe
TrendMicro-HouseCallTROJ_GEN.R002C0DAB22
RisingTrojan.Kryptik!1.D284 (CLOUD)
YandexTrojan.Injector!kgW0irYUtJ0
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Copak.AGMG!tr
BitDefenderThetaGen:NN.ZexaF.34114.kuZ@aeSC5Sd
AVGWin32:Evo-gen [Susp]
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Trojan.Win32.Copak.mypg?

Trojan.Win32.Copak.mypg removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment