The Tinba Trojan is a dangerous weapon used against computer users worldwide. It infects via vulnerabilities and other common methods. Our article gives an overview of its behavior according to the collected samples and available reports, also it may be helpful in attempting to remove the virus.
|Short Description||The Tinba Trojan is a computer virus that is designed to silently infiltrate computer systems.|
|Symptoms||The victims may not experience any apparent symptoms of infection.|
|Distribution Method||Software Vulnerabilities, Freeware Installations, Bundled Packages, Scripts and others.|
See If Your System Has Been Affected by malware
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Tinba Trojan.|
Tinba Trojan – Update September 2019
A newer version of the Tinb Troject appears to be based on the Visual Basic 6 runtime which requires the relevant runtime to be installed properly on the victim systems. Instead of using fake Adobe Flash Player updates, scam email messages or other methods the hackers behind the attack campaign uses a different approach. The criminal group will distribute malware Flash Games, one of the popular carriers is called FergusGamez.exe which includes the following file description: “flash game Lucknow is the capital city of the state of Uttar”. Their file size is less than 100 kB and the malware code is carefully obsuscated in them. This makes it very difficult to discover the virus infection.
Like previous versions the Tinba Trojan will execute a security bypass that will detect if its running inside a virtual or isolated environment. This is done by doing 3 independent checks: for free space, memory status and network adapter profiles. If the main engine decides that it is safe to continue it will spawn another process which is a legitimate Windows application into which its own malicious code will be placed. Through it will inject itself into the explorer.exe allowing for various other actions to take place:
- Persistent Installation — This enables to automatically start once the computer is powered on. It can also block access to the recovery boot options.
- Windows Registry Changes — The engine can edit out existing entries in the Windows Registry as well as create new ones. This can lead to severe performance issues, errors and data loss.
As usual the Trojan client will establish a secure and persistent connection with the hacker-controlled server which is typical for Tinba.
Tinba Trojan – Update July 2019
The Tinba Trojan has been associated with targeted attack campaigns against certain certain targets. The last global wave was against Russian companies which means that this weapon can be used effectively against whole states and sensitive targets. To a large degree this is chosen because of its small size and its ability to interact with the target operating system. It can inject itself to various processes and as a result gain a lot of information about the victims and conduct its banking Trojan activities.
Tinba Trojan – Distribution Methods
The Tinba Trojan is one of the most dangerous banking Trojans of late which comes up with active campaigns in intervals, targeting different companies and financial institutions. It takes code snippets from other threats and has been known to security researchers since 2012. One of the distinct characteristics that it possesses is that its code base is very small and it can take various forms. Many variants of it can be produced.
It can be embedded across a variety of file types:
- Documents — The entire Trojan code base can be compressed in macros that can be made part of the most popular document types: presentations, text documents, spreadsheets and databases. Whenever they are opened by the victims a prompt will appear asking them to enable the scripts. This action will trigger the Trojan delivery and installation.
- Application Installers — The code can also be placed in the application installers of all popular software: creativity suites, system utilities, productivity and office tools.
- Stand-Alone Files — The virus files can be created in separate files that can be spread using a variety of tactics.
One of the main methods that are used in order to infect the targets are code infections on existing processes. As this is a Trojan the hackers behind it can use various platforms that launch vulnerability testing. They load the network addresses of the intended victims and probe for any open services that may be of older versions. If a weakness is found the platform will attempt to deploy the Tinba Trojan.
There is no information available about the attackers the source code of the Trojan is available on the underground hacker communities. The Trojan can be offered by various collectives that offer custom variants for a certain fee. It can establish man-in-the-browser attacks and network manipulation. This means that the hackers can use a variety of other mechanisms as well. They ca create networks of malicious sites that use similar sounding domain names to legitimate and well-known Internet portals. To make them appear as trustworthy self-signed security certificates can be added.
The captured samples that have been found in the current and ongoing Tinba Trojan are posing as fun online Flash games. The method of distribution is through web sites and various kind of redirects. Many virus infections can be caused by people visiting these sites or downloading the presented executables files. Larger attack campaigns can also make use of web content elements such as ads, banners, pop-ups and etc.
Tinba Trojan – Detailed Description
The discovered malware in the current attack campaign is called “Dealhoya” attributed to the project name. As they are spread as online flash games or stand-alone executables the victims can get infected via different mechanisms, thus leading to a large number of potentially affected users.
As soon as an infection has been made the main engine will trigger a complex behavior pattern which will launch various components in a predefined sequence. It can not only launch its own commands, but also will interact with the Windows API. One of the first actions that are run are related to the security bypass. By calling certain API functions and monitoring processes the Tinba Trojan can find out if it is running inside a virtual machine or such software are installed on the target computers. If such a condition is found the Trojan may stop running or altogether delete itself in order to evade detection. This behavior can then be extended to other security software such as anti-virus programs, firewalls, intrusion detection systems and etc. Their respective engines can be blocked or entirely removed.
The code injection will happen next — the Tinba Trojan will create a process for itself from which it will launch a legitimate service known as winver.exe onto which the malicious code will be inserted. This is the standard application which is responsible for displaying the Windows version information.
The injected code will search for the presence of explorer.exe, if it is active in memory secondary code will be placed. The main Tinba Trojan code will be embedded in all active processes. As a result more than ten or more injected processes running at the same time.
An executable file will be dropped to the %AppData% location and following this the Windows Registry values will be modified in order to lead to a persistent installation. This means that the threat will automatically start once the computer is powered on.
The fact that an unique value is assigned to each value shows that a built-in algorithm is programmed to generate them. It usually takes its input values from information such as the installed hardware parts, system settings and certain operating system environment conditions.
One of the main goals of the engine is to establish a secure and persistent connection to a hacker-controlled site. It allows the criminals to take over control of the machines at any given time, deploy other threats and steal sensitive data.
What follows this procedure is the actual banking Trojan operations. The explorer.exe will use a man-in-the-browser attack which will look out for any active web browsers and other applications used to access online web banking. The banking Trojan will monitor for signals of such interaction and keylog all entered account credentials thereby hijacking the services. All accessed information will be encrypted and sent immediately to the hacker operators.
Banking Trojans can react in several different ways:
- Keylogger Use — The Tinba Trojan can use the built-in keylogger in order to harvest the credentials of the victims as soon as they are entered.
- Browser Interaction — The Tinba Trojan can interact directly with the installed web browsers by monitoring their use. If an online banking event is detected the associated engine will automatically monitor the users entered keyboard strings and mouse movement.
- User Interaction Changes — While the users are making transactions or other types of online banking activity the Trojan can automatically change the recipient fields without making it visible to the users.
We anticipate that other versions might include another type of malicious behavior.
Remove Tinba Trojan Completely
To remove Tinba Trojan manually from your computer, follow the step-by-step removal tutorial written down below. In case this manual removal does not get rid of the Trojan malware completely, you should search for and remove any leftover items with an advanced anti-malware tool. Such software can keep your computer secure in the future.
- Guide 1: How to Remove Tinba Trojan from Windows.
- Guide 2: Get rid of Tinba Trojan on Mac OS X.
- Guide 3: Remove Tinba Trojan in Google Chrome.
- Guide 4: Erase Tinba Trojan from Mozilla Firefox.
- Guide 5: Uninstall Tinba Trojan from Microsoft Edge.
- Guide 6: Remove Tinba Trojan from Safari.
- Guide 7: Eliminate Tinba Trojan from Internet Explorer.
- Guide 8: Disable Tinba Trojan Push Notifications in Your Browsers.
How to Remove Tinba Trojan from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove Tinba Trojan
Step 2: Uninstall Tinba Trojan and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it.
Step 3: Clean any registries, created by Tinba Trojan on your computer.
The usually targeted registries of Windows machines are the following:
You can access them by opening the Windows registry editor and deleting any values, created by Tinba Trojan there. This can happen by following the steps underneath:
Get rid of Tinba Trojan from Mac OS X.
Step 1: Uninstall Tinba Trojan and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove Tinba Trojan via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove Tinba Trojan files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as Tinba Trojan, the recommended way of eliminating the threat is by using an anti-malware program. SpyHunter for Mac offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Remove Tinba Trojan from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Erase Tinba Trojan from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Uninstall Tinba Trojan from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Remove Tinba Trojan from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the Tinba Trojan will be removed.
Eliminate Tinba Trojan from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.
Remove Push Notifications caused by Tinba Trojan from Your Browsers.
Turn Off Push Notifications from Google Chrome
To disable any Push Notices from Google Chrome browser, please follow the steps below:
Step 1: Go to Settings in Chrome.
Step 2: In Settings, select “Advanced Settings”:
Step 3: Click “Content Settings”:
Step 4: Open “Notifications”:
Step 5: Click the three dots and choose Block, Edit or Remove options:
Remove Push Notifications on Firefox
Step 1: Go to Firefox Options.
Step 2: Go to “Settings”, type “notifications” in the search bar and click "Settings":
Step 3: Click “Remove” on any site you wish notifications gone and click “Save Changes”
Stop Push Notifications on Opera
Step 1: In Opera, press ALT+P to go to Settings
Step 2: In Setting search, type “Content” to go to Content Settings.
Step 3: Open Notifications:
Step 4: Do the same as you did with Google Chrome (explained below):
Eliminate Push Notifications on Safari
Step 1: Open Safari Preferences.
Step 2: Choose the domain from where you like push pop-ups gone and change to "Deny" from "Allow".