Tinba is a malicious Trojan horse, which steals personal and sensitive information from the compromised computer. This malicious parasite is able to add/remove files and folders, make registry changes and inject into other programs. Additionally it monitors and records network traffic information in the following file:
%SystemDrive%\Documents and Settings\All Users\Application Data\default\web.dat
Moreover, Tinba modifies Mozilla Firefox, to disable warnings when you’re visiting insecure sites. It also modifies system registry to be able to execute every time Windows starts. It will inject malicious code to Internet Explorer, Google Chrome and Mozilla Firefox. Then it injects itself to explorer.exe and svchost.exe processes, and tries to end them.
Trojan Timba has another name - Zusy. Timba is famous for its really small size. Including all webinjects and configs it weights only 20kb. It comes without any packing or encryption. Trojan Tinba (Zusy) belongs to the completely new family of malware, security experts believe that we will see more activity from this family this year. The first ones who discovered this trojan were CSIS Security Group A/S. The name was shortened from the words "Tiny Banker" - Tinba. This is a trojan which hooks into browsers and steals all sensitive data, including but not limited to logins and credit card numbers. Trojan is not detected by most antivirus software.
Trojan timba uses really sneaky techniques, it infects itself into legitimate processes like explorer.exe, svchost.exe, firefox.exe also it creates process called winvert.exe. It target very small list or sites, moslty financial websites.
Here’s a list of command-and-control (C&C) servers, to which Tinba tries to send the stolen information:
Tinba manual removal
Delete registry values:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"default" = "%SystemDrive%\Documents and Settings\All Users\Application Data\default\bin.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\"1609" = "0"
%SystemDrive%\Documents and Settings\All Users\Application Data\default\bin.exe
Post a comment
Attention: Use this form only if you have additional information about a parasite, its removal instructions, additional resources or behavior. By clicking "post comment" button you agree not to post any copyrighted, unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, profane, hateful, racially, ethnically or otherwise objectionable material of any kind.