Trojan

Trojan.Tinba.19898 removal guide

Malware Removal

The Trojan.Tinba.19898 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Tinba.19898 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Expresses interest in specific running processes
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Tries to unhook or modify Windows functions monitored by Cuckoo

How to determine Trojan.Tinba.19898?


File Info:

name: ABB34706DCFC660ABD7F.mlw
path: /opt/CAPEv2/storage/binaries/6c6e9b062bbe2a95be82f7c102c9cc71af01ebb83f0764f0fc15c97a0504b1ae
crc32: FFEE3CB0
md5: abb34706dcfc660abd7fc1e50e1e9eb0
sha1: bd962d8c106e6e3cb1d8130cde196577a8778972
sha256: 6c6e9b062bbe2a95be82f7c102c9cc71af01ebb83f0764f0fc15c97a0504b1ae
sha512: acbdbea15863796a4b5fd54f2d8246f50924dbf33b52c7e0e7da0ba791826e7769c76293b6a5a5b5dd5a3f67da4566ba023e36246f6afa4f64840e5a987d64d8
ssdeep: 3072:lRwxRv7gKV1W4rIIAF4GGFs9vudNYLWB3HSFd0OW1yWcOiy5dcUa0+06sgE+R:lRUDfXW4ud90NYLWB3HSj0OWQWcOQl5b
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T117142ABDF5A77673C4A60BF687948BE226430D31DB808E53B1D40A0AE73644518EEDF5
sha3_384: 569adf3b1c0ece1dfa2db077a1671e915744bc8ee2f863a6249dc5b6e1b9bb2b4a3e5fa3c5dbf62b1ae70c89c44bc661
ep_bytes: 6a706820644200e80202000033db895d
timestamp: 2007-08-13 06:00:20

Version Info:

0: [No Data]

Trojan.Tinba.19898 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Cripack.Gen.1
FireEyeGeneric.mg.abb34706dcfc660a
CAT-QuickHealTrojan.Tinba.19898
CylanceUnsafe
ZillyaDropper.Injector.Win32.66699
K7AntiVirusRiskware ( 0040eff71 )
K7GWRiskware ( 0040eff71 )
Cybereasonmalicious.6dcfc6
CyrenW32/S-9a74e28b!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Tinba.BE
APEXMalicious
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Cripack.Gen.1
NANO-AntivirusTrojan.Win32.Inject.dqvidu
AvastWin32:GenMalicious-KOC [Trj]
TencentMalware.Win32.Gencirc.10b56ead
Ad-AwareTrojan.Cripack.Gen.1
SophosML/PE-A + Mal/Tinba-I
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Generic.ch
EmsisoftTrojan.Cripack.Gen.1 (B)
IkarusTrojan.Win32.Tinba
GDataTrojan.Cripack.Gen.1
JiangminTrojanDropper.Injector.avvb
WebrootTrojan.Dropper.Gen
AviraHEUR/AGEN.1117952
Antiy-AVLTrojan/Generic.ASMalwS.104687D
ArcabitTrojan.Cripack.Gen.1
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
CynetMalicious (score: 100)
Acronissuspicious
McAfeeObfuscated-FAAH!ABB34706DCFC
MAXmalware (ai score=86)
VBA32BScope.Trojan-Dropper.Inject
MalwarebytesMalware.AI.1893290974
RisingTrojan.Generic@ML.92 (RDML:NA4cn44yl3LNkORRybuwXA)
YandexTrojan.GenAsa!Ad94zd+qofs
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.DHKK!tr
BitDefenderThetaGen:NN.ZexaF.34062.lmW@a8uocuf
AVGWin32:GenMalicious-KOC [Trj]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan.Tinba.19898?

Trojan.Tinba.19898 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment