Trojan

Trojan.Win32.Copak.nhkl removal guide

Malware Removal

The Trojan.Win32.Copak.nhkl is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.nhkl virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.nhkl?


File Info:

name: 143F5554258A5DC4825F.mlw
path: /opt/CAPEv2/storage/binaries/7c74845389027e9247138e1403dd1c17d37ee69545beb31e79825e69d15616e5
crc32: F0A6D6CD
md5: 143f5554258a5dc4825f738ae07ae139
sha1: 6151cee51496fa9fd715a9ffe2f1bcfe5ca712d2
sha256: 7c74845389027e9247138e1403dd1c17d37ee69545beb31e79825e69d15616e5
sha512: efaa92303fd6c104d5b8bc664c86c445161a391548a67637f3043abb376e6db922f93fcd1d8bb8c2df2946141d89bcc3984a6ec9c391275adac0bbcb2d843434
ssdeep: 3072:i1cTBGqzj5VzYu5j4io9cml4PizUICjVq54C0QZh/3D49tmE:i18uu58iGX5haVqTD+IE
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T154F3DF791A6DB043F9177A3E434B41B737F8B743CCA69897EA0C51E3401206797EA9B8
sha3_384: 1bd0ee466b4060a2a2fa7978b0ab85e083fa5702df388ba24fa80996d6114cba6cc64568ab8cee5b28c2d7df7d1dbc25
ep_bytes: 6818f2afff5b81c238a7f04668d88540
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.nhkl also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Copak.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.865537
FireEyeGeneric.mg.143f5554258a5dc4
McAfeeArtemis!143F5554258A
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Glupteba.75e6a781
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.4258a5
BitDefenderThetaGen:NN.ZexaF.34114.kuZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DAC22
ClamAVWin.Malware.Iboz-9920378-0
KasperskyTrojan.Win32.Copak.nhkl
BitDefenderGen:Variant.Razy.865537
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Evo-gen [Susp]
TencentMalware.Win32.Gencirc.10cfc4db
Ad-AwareGen:Variant.Razy.865537
EmsisoftGen:Variant.Razy.865537 (B)
TrendMicroTROJ_GEN.R002C0DAC22
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
SophosMal/Generic-R + Troj/Agent-BGOS
IkarusTrojan.Win32.Injector
GDataGen:Variant.Razy.865537
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=87)
Antiy-AVLTrojan/Generic.ASMalwS.3375603
ArcabitTrojan.Razy.DD3501
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
VBA32BScope.Trojan.Wacatac
ALYacGen:Variant.Razy.865537
MalwarebytesTrojan.Crypt
APEXMalicious
RisingTrojan.Injector!1.CD26 (CLOUD)
YandexTrojan.Injector!WiS8j1HJ5io
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Evo-gen [Susp]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Trojan.Win32.Copak.nhkl?

Trojan.Win32.Copak.nhkl removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment