ThreatInfo Detection Digest: May 21, 2026

ThreatInfo research digest

A concise set of new file reports that were not used in recent digests. Each entry includes the detection name, MD5 hash, and a direct report link so analysts can verify the exact sample before taking action.

New report links20
Tracked categories5
Primary actionVerify hash

Category overview

Reports worth opening

Adware

Review browser changes, bundled installers, extensions, and unexpected advertising behavior.

DetectionUnder review
MD54613e165c5d983f9ddcfeb80b13752c6
DetectionAdware.ELEX
MD547b40e227e3052f7771983e01e8ac86c
DetectionAdware.ELEX
MD5e6d1cad9eaf851ea3a0aeddf9e05c930
DetectionAdware.ELEX
MD5e234649aaadafbbdabc3b8cea9660477

PUP/PUA

Check whether the file came from an installer bundle, optimizer, updater, or optional offer.

DetectionHack.KMS
MD594fef1eebf8b9ea06f49d7f8b7814826
DetectionGeneral Threat
MD54bf9e4d6402010b6428664f6d94ceeb9
DetectionPUP.Gen
MD5b47834aa24a378fd868230a695984774
DetectionUnder review
MD5a5bc93782cb9878183273dfe4e9a0fed

Trojan

Verify the hash and origin before trusting the filename; trojans often imitate legitimate software.

DetectionTrojan.CoinMiner
MD5eedb9d86ae8abc65fa7ac7c6323d4e8f
DetectionTrojan.Agent
MD5eb517f06479141a7e9f2b40cc2ec1d7e
DetectionTrojan.Packed
MD5cbcfaeb22e4847a6b1c33bb520b6920a
DetectionTrojan.Agent
MD5b21fe8bd5f4df84328a6b39818bbb7c5

Ransomware

Prioritize isolation and backup checks when this class appears on an endpoint.

DetectionRansom.Gen
MD555a0ab4f4d83edf1ce85a3cdd33f0444
DetectionTrojan.Agent
MD5d0d92aad1f57ebbe62375f2c3acbd1cf
DetectionRansom.Locky
MD522fb51966774b6ea15617b02e3326ec6
DetectionRansom.Locky
MD511e95cabdbbf61aec35de512575960ce

Virus

Look for copied or modified executables and scan related files created around the same time.

DetectionGeneral Threat
MD5b932ec254b999d192fe4ce8e1c0c365f
DetectionVirus.Jeefo
MD557b751688e912cacd4d26c7ab4e3f441
DetectionVirus.Jeefo
MD55f0d86772120ef011ec5db5e84414b36
DetectionVirus.Jeefo
MD538752e1c9011af7472165b63a29a8b4d

How to use this digest

Start with the MD5 hash, not the filename. If the hash or file path matches a system you manage, open the report, review the publisher and detection details, then scan the endpoint with GridinSoft Anti-Malware. ThreatInfo reports show whether GridinSoft already detects the file and which detection name is used.

Exit mobile version