ThreatInfo Detection Digest: May 20, 2026

ThreatInfo research digest

A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.

New report links20
Tracked categories5
Primary actionVerify hash

Category overview

Reports worth opening

Adware

Review browser changes, bundled installers, extensions, and unexpected advertising behavior.

DetectionAdware.ELEX
MD5ec7210a6e0806cfde79565952f3e84cc
DetectionAdware.ELEX
MD5ebbc91c4d1ed22ab09d15b5bd1a94b2f
DetectionAdware.ELEX
MD586b699b852da118187ecc6206a384e59
DetectionAdware.Downloader
MD5d5f616a38ff3817c73024153a2c943d5

PUP/PUA

Check whether the file came from an installer bundle, optimizer, updater, or optional offer.

DetectionUnder review
MD55ab1619363cd6d32defd85f7a5973ab3
DetectionUnder review
MD58f0f88bd0e4dec0305e19ac88784817c
DetectionUnder review
MD551d8129c77c091a76a327effc7d9c630
DetectionUnder review
MD5265df1773951ac9fd16f034151157be3

Trojan

Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.

DetectionHack.Gen
MD5f8daaaa06758d3f746aa1958952a3268
DetectionHack.Patcher
MD55325db41669aea870e16f48fbaa5dc22
DetectionTrojan.Gen
MD5e8a8772835bb378f4d6b744cd0f299d9
DetectionTrojan.Wacatac
MD53e16ef6d9fd607e0d8e9c373aa7bbbb0

Ransomware

Prioritize isolation and backup checks when this class appears on an endpoint.

DetectionRansom.Zpevdo
MD5b7277c74036338509e63aa2de0d418c3
DetectionRansom.Zpevdo
MD5d098e97c79759b1a9d3df996ca2a4c91
DetectionRansom.Zpevdo
MD5476fb3d64691c70eb889b0f145bd3a4b
DetectionGeneral Threat
MD51813bf05214e48b41f1107c7404cb6dd

Virus

Look for copied or modified executables and scan related files created around the same time.

DetectionVirus.Jeefo
MD5f9537370cb1006ec80726d99020a3372
DetectionVirus.Grenam
MD5781dde2c9f23f4f2e4a55fcfac3ca342
DetectionVirus.Jeefo
MD50cec8d7396ab048dd46ba354066aff80
DetectionVirus.Jeefo
MD5a80ce0fc7474a3090186582ab33a6636

How to use this digest

Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.