ThreatInfo research digest
A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.
New report links20
Tracked categories5
Primary actionVerify hash
Reports worth opening
Adware
Review browser changes, bundled installers, extensions, and unexpected advertising behavior.
DetectionAdware.Linkury
MD58d2ab1ecd060eabc476e6c742aa27018
DetectionUnder review
MD5d60de33a6af6ed457a687317fb93d231
DetectionUnder review
MD5e3b1efd1225529542bde9d3fd4a589e3
DetectionAdware.Gen
MD5328e794278cc30ca7c06e346a18b1abc
PUP/PUA
Check whether the file came from an installer bundle, optimizer, updater, or optional offer.
DetectionUnder review
MD5a40a8ed546f8667d6504d3facc1b7c38
DetectionUnder review
MD58281fdc4f6a1fff661f0f19dd27e4697
DetectionUnder review
MD5f0c25ed699ad52e411745f64299bb58d
DetectionUnder review
MD54b0f7b45ad1b59858c0a0d9fa07c9f05
Trojan
Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.
DetectionTrojan.CoinMiner
MD5992093482ab15e260bf747bf74cec0d6
DetectionGeneral Threat
MD565919e61428bdaf8a0826fbf277f66cf
DetectionGeneral Threat
MD59427ea4a025409bcd86c3a8c90e9d160
DetectionTrojan.Packed
MD50d46b2474ce246ab978df823f24c6223
Ransomware
Prioritize isolation and backup checks when this class appears on an endpoint.
DetectionTrojan.Injector
MD5eff37e44093c0252f5cbca55cb25d590
DetectionRansom.Skeeyah
MD5b1f0a6b2ddfc9f8442251dc91519dff1
DetectionRansom.STOP
MD5716fc1f9d0a342fe97c70576cb84beda
DetectionRansom.STOP
MD5778e0745b1d5e85e0141d390b4bc5783
Virus
Look for copied or modified executables and scan related files created around the same time.
DetectionVirus.Virut
MD57e691b647c3181e96d335f4063a96e90
DetectionGeneral Threat
MD5ad5964770169b6bbacae80b97a7cf637
DetectionPack.Gen
MD5366480d909b7c917f73b27336ce86432
DetectionGeneral Threat
MD5e5be8da5eb5cc74f8fa44794cc150291
How to use this digest
Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.
Related