ThreatInfo Detection Digest: May 14, 2026

ThreatInfo research digest

A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.

New report links20
Tracked categories5
Primary actionVerify hash

Category overview

Reports worth opening

Adware

Review browser changes, bundled installers, extensions, and unexpected advertising behavior.

DetectionAdware.Shopper
MD594f2162afb48e3d6aac78490259d8131
DetectionAdware.Shopper
MD5376694cc99a73ab80eadd952484e63e8
DetectionAdware.Shopper
MD56447e275a16da1d6fc9dc1d40538707e
DetectionAdware.Shopper
MD5e127e9d605635df6e22876d1282e5bfe

PUP/PUA

Check whether the file came from an installer bundle, optimizer, updater, or optional offer.

DetectionUnder review
MD594bfdc941878aacd633d6c6596d0e3e6
DetectionGeneral Threat
MD5539226398e549db4ad8dbfdef5049a65
DetectionGeneral Threat
MD55621e6f75d6576e39461747b25131813
DetectionGeneral Threat
MD594e200359659754a01ce765421e85a3a

Trojan

Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.

DetectionTrojan.Agent
MD5cbcfaeb22e4847a6b1c33bb520b6920a
File32.exe
DetectionGeneral Threat
MD587bcefddbb591c34932d5218c1862702
DetectionTrojan.Agent
MD5b21fe8bd5f4df84328a6b39818bbb7c5
DetectionGeneral Threat
MD5df9f6bfca92822cc878eac8faeecdf50

Ransomware

Prioritize isolation and backup checks when this class appears on an endpoint.

DetectionTrojan.DelShad
MD5c115ac21da61965c5ecf203772e0777f
DetectionTrojan.WannaCrypt
MD53d3b7e106612cc5086ef3e8aff697829
DetectionTrojan.Agent
MD5d0d92aad1f57ebbe62375f2c3acbd1cf
DetectionRansom.Blocker
MD598a8ced05b34189b8b36760049b2ea36

Virus

Look for copied or modified executables and scan related files created around the same time.

DetectionVirus.Ramnit
MD5f6fccfba5e4efe0ba613878c9a894d36
DetectionTrojan.Agent
MD5a101544a8a79ee3c1584de630be96ee4
DetectionVirus.Jeefo
MD5e0e6d2130c78a8644998ee10300040eb
DetectionVirus.Jeefo
MD5546b4a454fd89008ce55d0fe92ec7654

How to use this digest

Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.