Trojan

Trojan.Win32.Copak.njmk information

Malware Removal

The Trojan.Win32.Copak.njmk is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.Copak.njmk virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes its original binary from disk
  • Created a process from a suspicious location
  • Creates a copy of itself

How to determine Trojan.Win32.Copak.njmk?


File Info:

name: A694D12D8DD506643317.mlw
path: /opt/CAPEv2/storage/binaries/bec2bf770b873d2719d5c51ee35fb86b745b498d5600d67b3175675f40673db7
crc32: 6DA7C8F6
md5: a694d12d8dd5066433173552d6c2a591
sha1: 06d05c2980bfe1e060d2d089c93832473ffb086d
sha256: bec2bf770b873d2719d5c51ee35fb86b745b498d5600d67b3175675f40673db7
sha512: 7398896402f2ef0281faff3c797dde7e1ba7c7286edc0b6abacdc54e5254ed3d1834c1303c7d01f7d8624f2ab80359559c2a9b21b741b9fc294326aeaf87e475
ssdeep: 3072:vIl1VgQxR+ewWae6UZc4jSnnWY+NcxJ/4rtl8NXXJ+5s+erjSn2:vI/VgC+eww6UV4nWdi/4rtaJIsTr42
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T167049B2CE90726F5EAD19CBC98B1F9DF1FAD08F2A6B52BA84D4050B60364DFF9523450
sha3_384: 331f6e6675d54b85700d0b6d0f81bb455c9b8813844c5bdc07f2fa6db86607fde9416ac2e964bc9bd462920604207076
ep_bytes: bf8c80bcdf68d885400081eb35401483
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Trojan.Win32.Copak.njmk also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Convagent.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Siggen14.7487
MicroWorld-eScanGen:Variant.Razy.900994
FireEyeGeneric.mg.a694d12d8dd50664
McAfeeGlupteba-FTSD!A694D12D8DD5
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00577ea11 )
AlibabaTrojan:Win32/Glupteba.b3688d56
K7GWTrojan ( 00577ea11 )
Cybereasonmalicious.d8dd50
BitDefenderThetaGen:NN.ZexaF.34114.luZ@aeSC5Sd
CyrenW32/Zbot.W.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Injector.DZQA
TrendMicro-HouseCallTROJ_GEN.R002C0DAD22
ClamAVWin.Trojan.Razy-9933862-0
KasperskyTrojan.Win32.Copak.njmk
BitDefenderGen:Variant.Razy.900994
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
AvastWin32:Evo-gen [Susp]
TencentTrojan.Win32.Copak.wa
Ad-AwareGen:Variant.Razy.900994
SophosTroj/Agent-BGOS
TrendMicroTROJ_GEN.R002C0DAD22
McAfee-GW-EditionBehavesLike.Win32.Glupteba.cc
EmsisoftGen:Variant.Razy.900994 (B)
IkarusTrojan.Win32.Injector
GDataGen:Variant.Razy.900994
JiangminTrojan.Copak.boki
AviraTR/Dropper.Gen
MAXmalware (ai score=87)
Antiy-AVLTrojan/Generic.ASMalwS.33AD4C7
GridinsoftRansom.Win32.Wacatac.sa
ArcabitTrojan.Razy.DDBF82
MicrosoftTrojan:Win32/Glupteba.DB!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.RL_Generic.R293305
VBA32BScope.Trojan.Wacatac
ALYacGen:Variant.Razy.900994
MalwarebytesTrojan.Crypt
APEXMalicious
RisingTrojan.Injector!1.CD26 (RDMK:cmRtazqqA//veqSul8Oxoi/IN/2/)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Copak.AGMG!tr
AVGWin32:Evo-gen [Susp]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan.Win32.Copak.njmk?

Trojan.Win32.Copak.njmk removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment