THREAT REMOVAL

The Tinba Trojan is a dangerous weapon used against computer users worldwide. It infects via vulnerabilities and other common methods. Our article gives an overview of its behavior according to the collected samples and available reports, also it may be helpful in attempting to remove the virus.

Threat Summary

NameTinba Trojan
TypeTrojan
Short DescriptionThe Tinba Trojan is a computer virus that is designed to silently infiltrate computer systems.
SymptomsThe victims may not experience any apparent symptoms of infection.
Distribution MethodSoftware Vulnerabilities, Freeware Installations, Bundled Packages, Scripts and others.
Detection Tool See If Your System Has Been Affected by malware

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Tinba Trojan.

Tinba Trojan – Update September 2019

A newer version of the Tinb Troject appears to be based on the Visual Basic 6 runtime which requires the relevant runtime to be installed properly on the victim systems. Instead of using fake Adobe Flash Player updates, scam email messages or other methods the hackers behind the attack campaign uses a different approach. The criminal group will distribute malware Flash Games, one of the popular carriers is called FergusGamez.exe which includes the following file description: “flash game Lucknow is the capital city of the state of Uttar”. Their file size is less than 100 kB and the malware code is carefully obsuscated in them. This makes it very difficult to discover the virus infection.

Like previous versions the Tinba Trojan will execute a security bypass that will detect if its running inside a virtual or isolated environment. This is done by doing 3 independent checks: for free space, memory status and network adapter profiles. If the main engine decides that it is safe to continue it will spawn another process which is a legitimate Windows application into which its own malicious code will be placed. Through it will inject itself into the explorer.exe allowing for various other actions to take place:

  • Persistent Installation — This enables to automatically start once the computer is powered on. It can also block access to the recovery boot options.
  • Windows Registry Changes — The engine can edit out existing entries in the Windows Registry as well as create new ones. This can lead to severe performance issues, errors and data loss.

As usual the Trojan client will establish a secure and persistent connection with the hacker-controlled server which is typical for Tinba.

Tinba Trojan – Update July 2019

The Tinba Trojan has been associated with targeted attack campaigns against certain certain targets. The last global wave was against Russian companies which means that this weapon can be used effectively against whole states and sensitive targets. To a large degree this is chosen because of its small size and its ability to interact with the target operating system. It can inject itself to various processes and as a result gain a lot of information about the victims and conduct its banking Trojan activities.

Tinba Trojan – Distribution Methods

The Tinba Trojan is one of the most dangerous banking Trojans of late which comes up with active campaigns in intervals, targeting different companies and financial institutions. It takes code snippets from other threats and has been known to security researchers since 2012. One of the distinct characteristics that it possesses is that its code base is very small and it can take various forms. Many variants of it can be produced.

It can be embedded across a variety of file types:

  • Documents — The entire Trojan code base can be compressed in macros that can be made part of the most popular document types: presentations, text documents, spreadsheets and databases. Whenever they are opened by the victims a prompt will appear asking them to enable the scripts. This action will trigger the Trojan delivery and installation.
  • Application Installers — The code can also be placed in the application installers of all popular software: creativity suites, system utilities, productivity and office tools.
  • Stand-Alone Files — The virus files can be created in separate files that can be spread using a variety of tactics.

One of the main methods that are used in order to infect the targets are code infections on existing processes. As this is a Trojan the hackers behind it can use various platforms that launch vulnerability testing. They load the network addresses of the intended victims and probe for any open services that may be of older versions. If a weakness is found the platform will attempt to deploy the Tinba Trojan.

There is no information available about the attackers the source code of the Trojan is available on the underground hacker communities. The Trojan can be offered by various collectives that offer custom variants for a certain fee. It can establish man-in-the-browser attacks and network manipulation. This means that the hackers can use a variety of other mechanisms as well. They ca create networks of malicious sites that use similar sounding domain names to legitimate and well-known Internet portals. To make them appear as trustworthy self-signed security certificates can be added.

The captured samples that have been found in the current and ongoing Tinba Trojan are posing as fun online Flash games. The method of distribution is through web sites and various kind of redirects. Many virus infections can be caused by people visiting these sites or downloading the presented executables files. Larger attack campaigns can also make use of web content elements such as ads, banners, pop-ups and etc.

Tinba Trojan – Detailed Description

The discovered malware in the current attack campaign is called “Dealhoya” attributed to the project name. As they are spread as online flash games or stand-alone executables the victims can get infected via different mechanisms, thus leading to a large number of potentially affected users.

As soon as an infection has been made the main engine will trigger a complex behavior pattern which will launch various components in a predefined sequence. It can not only launch its own commands, but also will interact with the Windows API. One of the first actions that are run are related to the security bypass. By calling certain API functions and monitoring processes the Tinba Trojan can find out if it is running inside a virtual machine or such software are installed on the target computers. If such a condition is found the Trojan may stop running or altogether delete itself in order to evade detection. This behavior can then be extended to other security software such as anti-virus programs, firewalls, intrusion detection systems and etc. Their respective engines can be blocked or entirely removed.

The code injection will happen next — the Tinba Trojan will create a process for itself from which it will launch a legitimate service known as winver.exe onto which the malicious code will be inserted. This is the standard application which is responsible for displaying the Windows version information.

The injected code will search for the presence of explorer.exe, if it is active in memory secondary code will be placed. The main Tinba Trojan code will be embedded in all active processes. As a result more than ten or more injected processes running at the same time.

An executable file will be dropped to the %AppData% location and following this the Windows Registry values will be modified in order to lead to a persistent installation. This means that the threat will automatically start once the computer is powered on.

The fact that an unique value is assigned to each value shows that a built-in algorithm is programmed to generate them. It usually takes its input values from information such as the installed hardware parts, system settings and certain operating system environment conditions.

One of the main goals of the engine is to establish a secure and persistent connection to a hacker-controlled site. It allows the criminals to take over control of the machines at any given time, deploy other threats and steal sensitive data.

What follows this procedure is the actual banking Trojan operations. The explorer.exe will use a man-in-the-browser attack which will look out for any active web browsers and other applications used to access online web banking. The banking Trojan will monitor for signals of such interaction and keylog all entered account credentials thereby hijacking the services. All accessed information will be encrypted and sent immediately to the hacker operators.

Banking Trojans can react in several different ways:

  • Keylogger Use — The Tinba Trojan can use the built-in keylogger in order to harvest the credentials of the victims as soon as they are entered.
  • Browser Interaction — The Tinba Trojan can interact directly with the installed web browsers by monitoring their use. If an online banking event is detected the associated engine will automatically monitor the users entered keyboard strings and mouse movement.
  • User Interaction Changes — While the users are making transactions or other types of online banking activity the Trojan can automatically change the recipient fields without making it visible to the users.

We anticipate that other versions might include another type of malicious behavior.

Remove Tinba Trojan Completely

To remove Tinba Trojan manually from your computer, follow the step-by-step removal tutorial written down below. In case this manual removal does not get rid of the Trojan malware completely, you should search for and remove any leftover items with an advanced anti-malware tool. Such software can keep your computer secure in the future.

Avatar

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus


Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer

How to Remove Tinba Trojan from Windows.


Step 1: Boot Your PC In Safe Mode to isolate and remove Tinba Trojan

OFFER

Manual Removal Usually Takes Time and You Risk Damaging Your Files If Not Careful!
We Recommend To Scan Your PC with SpyHunter

Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter's EULA, Privacy Policy and Threat Assessment Criteria

1. Hold Windows key() + R


2. The "Run" Window will appear. In it, type "msconfig" and click OK.


3. Go to the "Boot" tab. There select "Safe Boot" and then click "Apply" and "OK".
Tip: Make sure to reverse those changes by unticking Safe Boot after that, because your system will always boot in Safe Boot from now on.


4. When prompted, click on "Restart" to go into Safe Mode.


5. You can recognise Safe Mode by the words written on the corners of your screen.


Step 2: Uninstall Tinba Trojan and related software from Windows

Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:


1. Hold the Windows Logo Button and "R" on your keyboard. A Pop-up window will appear.


2. In the field type in "appwiz.cpl" and press ENTER.


3. This will open a window with all the programs installed on the PC. Select the program that you want to remove, and press "Uninstall"
Follow the instructions above and you will successfully uninstall most programs.


Step 3: Clean any registries, created by Tinba Trojan on your computer.

The usually targeted registries of Windows machines are the following:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

You can access them by opening the Windows registry editor and deleting any values, created by Tinba Trojan there. This can happen by following the steps underneath:

1. Open the Run Window again, type "regedit" and click OK.


2. When you open it, you can freely navigate to the Run and RunOnce keys, whose locations are shown above.


3. You can remove the value of the virus by right-clicking on it and removing it.
Tip: To find a virus-created value, you can right-click on it and click "Modify" to see which file it is set to run. If this is the virus file location, remove the value.

IMPORTANT!
Before starting "Step 4", please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Step 4: Scan for Tinba Trojan with SpyHunter Anti-Malware Tool

1. Click on the "Download" button to proceed to SpyHunter's download page.


It is recommended to run a scan before purchasing the full version of the software to make sure that the current version of the malware can be detected by SpyHunter. Click on the corresponding links to check SpyHunter's EULA, Privacy Policy and Threat Assessment Criteria.


2. After you have installed SpyHunter, wait for it to update automatically.

SpyHunter5-update-2018


3. After the update process has finished, click on the 'Malware/PC Scan' tab. A new window will appear. Click on 'Start Scan'.

SpyHunter5-Free-Scan-2018


4. After SpyHunter has finished scanning your PC for any files of the associated threat and found them, you can try to get them removed automatically and permanently by clicking on the 'Next' button.

SpyHunter-5-Free-Scan-Next-2018

If any threats have been removed, it is highly recommended to restart your PC.


Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer

Get rid of Tinba Trojan from Mac OS X.


Step 1: Uninstall Tinba Trojan and remove related files and objects

OFFER
Manual Removal Usually Takes Time and You Risk Damaging Your Files If Not Careful!
We Recommend To Scan Your Mac with SpyHunter for Mac
Keep in mind, that SpyHunter for Mac needs to purchased to remove the malware threats. Click on the corresponding links to check SpyHunter’s EULA and Privacy Policy


1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:


2. Find Activity Monitor and double-click it:


3. In the Activity Monitor look for any suspicious processes, belonging or related to Tinba Trojan:

Tip: To quit a process completely, choose the “Force Quit” option.


4. Click on the "Go" button again, but this time select Applications. Another way is with the ⇧+⌘+A buttons.


5. In the Applications menu, look for any suspicious app or an app with a name, similar or identical to Tinba Trojan. If you find it, right-click on the app and select “Move to Trash”.


6: Select Accounts, after which click on the Login Items preference. Your Mac will then show you a list of items that start automatically when you log in. Look for any suspicious apps identical or similar to Tinba Trojan. Check the app you want to stop from running automatically and then select on the Minus (“-“) icon to hide it.


7: Remove any left-over files that might be related to this threat manually by following the sub-steps below:

  • Go to Finder.
  • In the search bar type the name of the app that you want to remove.
  • Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
  • If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.

In case you cannot remove Tinba Trojan via Step 1 above:

In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:

Disclaimer! If you are about to tamper with Library files on Mac, be sure to know the name of the virus file, because if you delete the wrong file, it may cause irreversible damage to your MacOS. Continue on your own responsibility!

1: Click on "Go" and Then "Go to Folder" as shown underneath:

2: Type in "/Library/LauchAgents/" and click Ok:

3: Delete all of the virus files that have similar or the same name as Tinba Trojan. If you believe there is no such file, do not delete anything.

You can repeat the same procedure with the following other Library directories:

→ ~/Library/LaunchAgents
/Library/LaunchDaemons

Tip: ~ is there on purpose, because it leads to more LaunchAgents.


Step 2: Scan for and remove malware from your Mac

When you are facing problems on your Mac as a result of unwanted scripts, programs and malware, the recommended way of eliminating the threat is by using an anti-malware program. Combo Cleaner offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.



Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Remove Tinba Trojan from Google Chrome.


Step 1: Start Google Chrome and open the drop menu


Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"


Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.


Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.


Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Erase Tinba Trojan from Mozilla Firefox.

Step 1: Start Mozilla Firefox. Open the menu window


Step 2: Select the "Add-ons" icon from the menu.


Step 3: Select the unwanted extension and click "Remove"


Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.



Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Uninstall Tinba Trojan from Microsoft Edge.


Step 1: Start Edge browser.


Step 2: Open the drop menu by clicking on the icon at the top right corner.


Step 3: From the drop menu select "Extensions".


Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.


Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.



Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Remove Tinba Trojan from Safari.


Step 1: Start the Safari app.


Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.


Step 3: From the menu, click on "Preferences".

stf-safari preferences


Step 4: After that, select the 'Extensions' Tab.

stf-safari-extensions


Step 5: Click once on the extension you want to remove.


Step 6: Click 'Uninstall'.

stf-safari uninstall

A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the Tinba Trojan will be removed.


How to Reset Safari
IMPORTANT: Before resetting Safari make sure you back up all your saved passwords within the browser in case you forget them.

Start Safari and then click on the gear leaver icon.

Click the Reset Safari button and you will reset the browser.


Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer


Eliminate Tinba Trojan from Internet Explorer.


Step 1: Start Internet Explorer.


Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'


Step 3: In the 'Manage Add-ons' window.


Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.


Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...