Threat Database Trojans Trojan.Soltern.CA

Trojan.Soltern.CA

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 14,438
Threat Level: 80 % (High)
Infected Computers: 1,932
First Seen: October 24, 2021
Last Seen: February 14, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Soltern.CA
Signature status: No Signature

Known Samples

MD5: 08a54c5c3e5fbc74ee7eeb0b776bb399
SHA1: ee528ca9ed3066cade9a66ef073427a10b2d3bbf
SHA256: F85F47DD21F8B69D856022F3F86096A2B0F6668CFB0BFA12593C0AE75F0CCDF4
File Size: 704.00 KB, 704000 bytes
MD5: c1f65a13185059c351a66506f0733bfd
SHA1: 820e6e0bad10be9b1a8385762027f29cf023164b
SHA256: B770092EDCD253CACC638CE08A8FB3BC215E410DCA2B29E32F3BA07F4A0D01FB
File Size: 836.37 KB, 836373 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments http://enetwork.ncbuy.com
Company Name
  • kemira
  • NetCent Communications
File Description
  • HangARoo
  • pix & pax in: operation clearwater
File Version
  • 1.1
  • 1.0
Internal Name NCBuy Entertainment Network HangARoo
Legal Copyright
  • © Copyright 2001 NetCent Communications
  • © Copyright 2002 mediasquad
Original Filename
  • HangARoo.exe
  • kemira - operation clearwater.exe
Product Name
  • HangARoo
  • pix & pax in: operation clearwater
Product Version
  • 1.1
  • 1.0

File Traits

  • 2+ executable sections
  • big overlay
  • HighEntropy
  • x86

Block Information

Total Blocks: 514
Potentially Malicious Blocks: 16
Whitelisted Blocks: 498
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 x 0 0 0 0 0 0 0 0 x 0 x 0 x 0 x 0 0 0 0 0 x x 0 0 0 0 x x 0 0 0 0 0 x 0 0 x 0 1 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Soltern.CA

Files Modified

File Attributes
c:\users\user\appdata\local\temp\hangaroo.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\jgl_rt\hangaroo_proj.exe Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\jgl_rt\jesterrun0.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\jgl_rt\jweb.exe Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Other Suspicious
  • SetWindowsHookEx
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\Users\Ufkgnxlv\AppData\Local\Temp\Jgl_Rt\hangaroo_proj.exe (NULL)

Trending

Most Viewed

Loading...