ThreatInfo Detection Digest: May 13, 2026

ThreatInfo research digest

A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.

New report links20
Tracked categories5
Primary actionVerify hash

Category overview

Reports worth opening

Adware

Review browser changes, bundled installers, extensions, and unexpected advertising behavior.

DetectionUnder review
MD59fb02fba90f6af59537a30c3db9777c8
DetectionAdware.ELEX
MD54c1c3aaafacc78ee820ca5e98ecf43e4
DetectionUnder review
MD54613e165c5d983f9ddcfeb80b13752c6
DetectionAdware.ELEX
MD5913c4c8247b7839b6043eaf150966a83

PUP/PUA

Check whether the file came from an installer bundle, optimizer, updater, or optional offer.

DetectionUnder review
MD52427fe812329ecd93304f5e4b64b16be
DetectionPUP.ELEX
MD56fea419122dcfabd79a17fc6c9ffb0a6
DetectionUnder review
MD55fade7137c14a94b323f3b7886fba2a9
DetectionHack.KMS
MD594fef1eebf8b9ea06f49d7f8b7814826

Trojan

Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.

DetectionUnder review
MD59e1742bff2f3c04b2c1c572aff146564
DetectionTrojan.CoinMiner
MD5eedb9d86ae8abc65fa7ac7c6323d4e8f
DetectionTrojan.CoinMiner
MD53afeb8e9af02a33ff71bf2f6751cae3a
DetectionTrojan.Agent
MD5eb517f06479141a7e9f2b40cc2ec1d7e

Ransomware

Prioritize isolation and backup checks when this class appears on an endpoint.

DetectionRansom.Gen
MD555a0ab4f4d83edf1ce85a3cdd33f0444
DetectionRansom.Ransom
MD57f7ccaa16fb15eb1c7399d422f8363e8
DetectionRansom.Gandcrab
MD5eb9e6531d9eacdbe5474da9d6b73d99e
DetectionRansom.WannaCrypt
MD5478abb44dbba06e87decd2df49f3d986

Virus

Look for copied or modified executables and scan related files created around the same time.

DetectionHack.Keygen
MD5ed4bd2fbf1381e22da37c09a935a51ef
DetectionGeneral Threat
MD5b932ec254b999d192fe4ce8e1c0c365f
DetectionVirus.Gen
MD5e59e119b3b2d3fe2a8ac8857c7dcecfc
DetectionTrojan.Agent
MD5ff5e1f27193ce51eec318714ef038bef

How to use this digest

Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.

Exit mobile version