ThreatInfo Detection Digest: May 18, 2026

ThreatInfo research digest

A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.

New report links20
Tracked categories5
Primary actionVerify hash

Category overview

Reports worth opening

Adware

Review browser changes, bundled installers, extensions, and unexpected advertising behavior.

DetectionAdware.MPC
MD582fd73b77d493f0e479d82afb2ea76c2
DetectionAdware.MPC
MD50b2af2aac7b120739f1b51fb7cd213c0
DetectionAdware.Linkury
MD50d508a37eb3484293eedd54a8696aa24
DetectionAdware.Linkury
MD5098e1bcc85bb32d92f9d69327346672a

PUP/PUA

Check whether the file came from an installer bundle, optimizer, updater, or optional offer.

DetectionUnder review
MD59882e67a4555ea41cf177051c2ba8acc
DetectionUnder review
MD50c0fc7162953c162d1e6e4c1274412d3
DetectionUnder review
MD519d62030c1124461a94fa6bccef70485
DetectionUnder review
MD5d92685007816eeec59d2072c8eab21a8

Trojan

Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.

DetectionWorm.Autorun
MD58f6f4725e2006be1ef00755854464d90
DetectionTrojan.Gen
MD5219c9cb02bf4cd60fdb0acc1b8b16649
DetectionTrojan.Agent
MD5b5cd242124951360780192e75306fd8a
DetectionTrojan.Gen
MD59da0bc2665206038d37f634c4d1dfd96

Ransomware

Prioritize isolation and backup checks when this class appears on an endpoint.

DetectionRansom.Locky
MD511e95cabdbbf61aec35de512575960ce
DetectionTrojan.Downloader
MD5c16f18cab7067f293a530c7201670820
DetectionTrojan.Downloader
MD5c6805aa45d706d5d2f969f04a3bfb112
DetectionTrojan.Kryptik
MD5f4926ebd721231a04ccc053ba19b9ace

Virus

Look for copied or modified executables and scan related files created around the same time.

DetectionVirus.Jeefo
MD5092e43ce6816ce50a1f8c4dfc8150feb
DetectionVirus.Jeefo
MD55f0d86772120ef011ec5db5e84414b36
DetectionVirus.Jeefo
MD538752e1c9011af7472165b63a29a8b4d
DetectionHack.Patcher
MD55b5101c9b0e2bb469f620f2794195619

How to use this digest

Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.

Exit mobile version