ThreatInfo Detection Digest: May 17, 2026

ThreatInfo research digest

A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.

New report links20
Tracked categories5
Primary actionVerify hash

Category overview

Reports worth opening

Adware

Review browser changes, bundled installers, extensions, and unexpected advertising behavior.

DetectionAdware.ELEX
MD547b40e227e3052f7771983e01e8ac86c
DetectionAdware.Agent
MD536cb95e29e20d1b066ec5b8eca6c4d20
DetectionAdware.Gen
MD5382b151daffe4a9ce9da9f564b66761e
DetectionAdware.ELEX
MD5eba35d35628ceb8acaa2302f9698a8d0

PUP/PUA

Check whether the file came from an installer bundle, optimizer, updater, or optional offer.

DetectionUnder review
MD5602cd1f0dd54e83de1413705aa378803
DetectionUnder review
MD5157d3660fea65e2ebdcd48647720950c
DetectionUnder review
MD555d44dc1ec699ffb6b3519a022153cac
DetectionUnder review
MD5a8d8a483602be55485fc8c6d7b2b680f

Trojan

Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.

DetectionTrojan.CoinMiner
MD5d9ec6f3a3b2ac7cd5eef07bd86e3efbc
DetectionTrojan.Agent
MD5a351f99236a011d4027886215b843317
DetectionAdware.Downloader
MD5fb1f04fb851fe921aec9148495669c55
DetectionGeneral Threat
MD5ff86bedaff2a06f098959a64b0758fb2

Ransomware

Prioritize isolation and backup checks when this class appears on an endpoint.

DetectionRansom.Samas
MD5c84e22d07f28fed6e366df5ba4383c7a
DetectionRansom.Locky
MD53ad96cb4e7d547882f605daeb2f380bf
DetectionTrojan.Agent
MD560236fe463e180272b98cf8f93208a80
DetectionRansom.Somhoveran
MD5b634e46e3ed42aef63135b218446025e

Virus

Look for copied or modified executables and scan related files created around the same time.

DetectionVirus.Jeefo
MD557b751688e912cacd4d26c7ab4e3f441
DetectionVirus.Jeefo
MD58a9ba91f7d7e59acdaae9b6ad4ac0896
DetectionVirus.Jeefo
MD5ba03a59336aaec6cbaa926ac9f5ceee0
DetectionVirus.Jeefo
MD55f27d952d735ac075cd12e173745cf61

How to use this digest

Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.

Exit mobile version