ThreatInfo Detection Digest: May 16, 2026

ThreatInfo research digest

A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.

New report links20
Tracked categories5
Primary actionVerify hash

Category overview

Reports worth opening

Adware

Review browser changes, bundled installers, extensions, and unexpected advertising behavior.

DetectionAdware.Kuaiba
MD5993921373facaef60cb9f9e84aab8301
DetectionAdware.ELEX
MD5405795bd5f916ee03792dbdb26d5f7fb
DetectionAdware.Linkury
MD54fa73ad05d5a1156a69d2a1e63274d05
DetectionAdware.WinYahoo (Heuristic)
MD56db617a9bba561395a76f927d684fcb9

PUP/PUA

Check whether the file came from an installer bundle, optimizer, updater, or optional offer.

DetectionAdware.Eszjuxuan
MD55141ea6b5f29546b2396c11bb003d392
DetectionPUP.Downloader
MD53a41815e8b51f2c408c90d56d6d5bf2a
DetectionPUP.SystemOptimizer
MD58221f21152e15f93258e2c990233313f
DetectionPUP.Systweak
MD5dd3c87a08c4d818857adb0ac11faca9b

Trojan

Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.

DetectionTrojan.Gen
MD56cf7eb5d6a39b07e09a9514cd10c22c9
DetectionGeneral Threat
MD560beb6ee9c05f8fff2ab1452dd9a7b33
DetectionTrojan.Agent
MD5d448a4727cca91df7ac0126a22830759
DetectionGeneral Threat
MD5a3996c7d739dbf4ea31aef8a3995bc0b

Ransomware

Prioritize isolation and backup checks when this class appears on an endpoint.

DetectionTrojan.Packed
MD5a2e978f5baf367befb197f2f6c0e48b6
DetectionPUP.Gen
MD5be2e8a1ee7555c374d87360f5d323d00
DetectionRansom.Locky
MD522fb51966774b6ea15617b02e3326ec6
DetectionRansom.Locky
MD57bc3aeedc18717d796f1c7ff8dbf0c17

Virus

Look for copied or modified executables and scan related files created around the same time.

DetectionVirus.Jeefo
MD59d79413a2dae9ac5d86a4970180d882f
DetectionVirus.Jeefo
MD5468d3738e998e76ba5713ae952e2e107
DetectionVirus.Jeefo
MD52e12601aa200e7e3fd2a794f79f2f02b
DetectionWorm.Autorun
MD53975d7f4543ed0eb25cd2e7932a99a1f

How to use this digest

Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.