Trojan

How to remove “Trojan.Tinba.G”?

Malware Removal

The Trojan.Tinba.G is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Tinba.G virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid

How to determine Trojan.Tinba.G?


File Info:

name: D07DF075625F1CCA86A7.mlw
path: /opt/CAPEv2/storage/binaries/6c689f407404f0ebf7a747e1313c52e2cf360c0dd85fdac22e82f31526783429
crc32: 4242389A
md5: d07df075625f1cca86a7dea3ff6f0d93
sha1: 0bdc37b159b6626f5b9ffe44bf7fcdd85751f155
sha256: 6c689f407404f0ebf7a747e1313c52e2cf360c0dd85fdac22e82f31526783429
sha512: d5d84932ca3c77b7fa0c7351aef7df1ada4973877c283e1f465108db92cf47a630021d2d1876533ec7398af7b240db7a489cc667fe43a3ce1e82ea32a8227994
ssdeep: 3072:H4kxmQPjpZiYc/gx0/3H6csw/8YSBQF3QfFniOUw4:H9xmKpZqIx0/3H+YSWF3QfRBZ4
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T10C14604D51F7C8F5ED6507F8ED61E520F22BF8540AB84CDA36C8620ED00F9EA467627A
sha3_384: 9f1674a9e3c642680a923d55eca17f9738dd63119682613d74ea61aab3ab94f457459e1bc757b0bb7862195fbddb5ef7
ep_bytes: 558bec6aff6808ab420068c048420064
timestamp: 2004-08-28 19:24:17

Version Info:

Comments: Posting
CompanyName: Lyrrus, Inc. dba GVOX
FileDescription: Reloaded
FileVersion: 145, 231, 201, 138
InternalName: Paceman
LegalCopyright: Copyright © 1219
LegalTrademarks: Persist
OriginalFilename: Laptops.exe
PrivateBuild: RandomNumer
ProductName: Recliner Perambulating
ProductVersion: 78, 49, 186, 5
SpecialBuild: RandomNumer

Trojan.Tinba.G also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.Yakes.4!c
MicroWorld-eScanTrojan.Tinba.G
FireEyeGeneric.mg.d07df075625f1cca
McAfeeRansom-Crowti!D07DF075625F
CylanceUnsafe
VIPRETrojan.Tinba.G
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 004b75071 )
AlibabaTrojan:Win32/Yakes.503d73eb
K7GWTrojan ( 004b75071 )
CrowdStrikewin/malicious_confidence_100% (W)
SymantecTrojan.Gen
Elasticmalicious (high confidence)
ESET-NOD32Win32/Tinba.BE
KasperskyTrojan.Win32.Yakes.pedn
BitDefenderTrojan.Tinba.G
NANO-AntivirusTrojan.Win32.Tinba.duhtzq
AvastWin32:Trojan-gen
TencentMalware.Win32.Gencirc.114ca0c4
Ad-AwareTrojan.Tinba.G
SophosML/PE-A + Mal/Tinba-G
ComodoMalware@#3lgo6lic9stov
DrWebTrojan.PWS.Tinba.153
ZillyaTrojan.Tinba.Win32.2709
McAfee-GW-EditionRansom-Crowti!D07DF075625F
EmsisoftTrojan.Tinba.G (B)
SentinelOneStatic AI – Suspicious PE
GDataTrojan.Tinba.G
JiangminTrojan/Banker.Tinba.bdl
WebrootW32.Trojan.GenKD
GoogleDetected
AviraHEUR/AGEN.1205374
MAXmalware (ai score=86)
Antiy-AVLTrojan/Generic.ASMalwS.24F
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 99)
BitDefenderThetaGen:NN.ZexaF.34698.mq1@ae2iXCci
ALYacTrojan.Tinba.G
VBA32Trojan.Yakes
RisingTrojan.Tinba!8.1B2 (TFE:5:p4Bmuwwt4dV)
YandexTrojan.GenAsa!JNZAgC3MTGA
IkarusTrojan.Win32.Tinba
MaxSecureTrojan.Malware.7164915.susgen
FortinetW32/Deshacop.XO!tr
AVGWin32:Trojan-gen
Cybereasonmalicious.5625f1
PandaTrj/Genetic.gen

How to remove Trojan.Tinba.G?

Trojan.Tinba.G removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment