Home / malware Trojan:Win32/Tinba.C
First posted on 11 September 2014.
Source: MicrosoftAliases :
There are no other names known for Trojan:Win32/Tinba.C.
Explanation :
Threat behavior
Installation
Trojan:Win32/Tinba.C copies itself to c:\documents and settings\administrator\application data\fda38b86\bin.exe. The malware changes the following registry entries so that it runs each time you start your PC:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "FDA38B86"
With data: "c:\documents and settings\administrator\application data\fda38b86\bin.exe" The malware creates the following files on your PC:
The malware uses code injection to make it harder to detect and remove. It can inject code into running processes, including the following:
- c:\documents and settings\administrator\application data\fda38b86\log.dat
- c:\documents and settings\administrator\application data\fda38b86\ntf.dat
- _avpm.exe
- adware.exe
- antivirus.exe
- asktao.exe
- AUPDATE.EXE
- AVGW.EXE
- avp32.exe
- avpcc.exe
- blackice.exe
- ccenter.exe
- cmd.exe
- DRWEB32.EXE
- egui.exe
- ekrn.exe
- ElementClient.exe
- explorer.exe
- fsav.exe
- game.exe
- InoRT.exe
- kav.exe
Payload
Contacts remote host
Trojan:Win32/Tinba.C might contact a remote host at microsoftupdate-server2.com using port 80. Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 c5d7683dcbc3aff3632f8c3998fb13df9284c6c6.Symptoms
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
c:\documents and settings\administrator\application data\fda38b86\bin.exe
c:\documents and settings\administrator\application data\fda38b86\log.dat
c:\documents and settings\administrator\application data\fda38b86\ntf.dat
- You see these entries or keys in your registry:
Sets value: "FDA38B86"
With data: "c:\documents and settings\administrator\application data\fda38b86\bin.exe"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunLast update 11 September 2014