ThreatInfo Detection Digest: May 15, 2026

ThreatInfo research digest

A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.

New report links20
Tracked categories5
Primary actionVerify hash

Category overview

Reports worth opening

Adware

Review browser changes, bundled installers, extensions, and unexpected advertising behavior.

DetectionAdware.Shopper
MD5c3839ac61ec9f04909dda23e4f1d769b
DetectionAdware.Shopper
MD58967eb8598899bf5dad7ac167e8eda27
DetectionAdware.Shopper
MD51af18c97c81859d26098300d570d69f9
DetectionAdware.ConvertAd
MD529b610e22bdb558437b566c55b4ad0a3

PUP/PUA

Check whether the file came from an installer bundle, optimizer, updater, or optional offer.

DetectionGeneral Threat
MD54bf9e4d6402010b6428664f6d94ceeb9
DetectionUnder review
MD58ce04a3499594b3322932585f17f6293
DetectionGeneral Threat
MD5164d27c9830ccdf485bbd1701f9e577e
DetectionPUP.Gen
MD5b47834aa24a378fd868230a695984774

Trojan

Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.

DetectionUnder review
MD5030b0e978bee347e9a671a7bea4501fe
DetectionTrojan.HackKMS
MD59e97011c50db3f6bc6a4b21be5197a1e
DetectionTrojan.Agent
MD55d4a433038eebee8950a0ae024cc9997
DetectionRansom.Wacatac
MD51d95f7c9135fefc44b34ef89a26de425

Ransomware

Prioritize isolation and backup checks when this class appears on an endpoint.

DetectionGeneral Threat
MD56aa3d81dcd255b51d9f850f7b246c6c1
DetectionHijack.Explorer
MD50f33994b64d1e030591babe1cb065e75
DetectionTrojan.Packed
MD510f94491c0c518e34d01c7edf67242ec
DetectionPUP.Gen
MD5fc443782dc6fa513de4a8f47ffe7d50c

Virus

Look for copied or modified executables and scan related files created around the same time.

DetectionVirus.Jeefo
MD50196a4d2d246775c140667bc70db8bb5
DetectionVirus.Jeefo
MD50c655a3e47caf4b73b918c97f25db058
DetectionVirus.Jeefo
MD5734a0cbb3601e8910985b4d472a4792d
DetectionVirus.Jeefo
MD5c906de44e37e13c7a31bd68fc8e73c02

How to use this digest

Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.