Stranger Strings: Yurei Ransomware Operator Toolkit Exposed
Active since September 2025, Yurei is a double extortion ransomware campaign. The operators run their own Tor data leak site with a low number of victims listed at the time of writing. It is reportedly derived from Prince Ransomware, an open-source ransomware family written in Go. Check Point researchers noted that all samples were first submitted to VirusTotal from Morocco, and that one sample did not include a ticket ID, indicating that this could be a test build, possibly uploaded by the developer themselves. Yurei ransomware samples also contained a link to SatanLockv2, based on the presence of the PDB path string “D:\satanlockv2” present in the Yurei samples.
AI Analysis
Technical Summary
The Yurei ransomware campaign, active since September 2025, represents a double extortion threat where attackers encrypt victim data and threaten to leak stolen information via a Tor-hosted leak site. Yurei is reportedly derived from Prince Ransomware, an open-source ransomware family written in the Go programming language, which facilitates rapid development and deployment. Check Point researchers observed that all known samples were initially submitted to VirusTotal from Morocco, suggesting possible origin or testing activities in that region. One sample lacked a ticket ID, indicating it may be a developer test build. Notably, Yurei samples contain references to SatanLockv2 ransomware, implying shared code or toolkits between these ransomware families. The campaign uses multiple tactics including network scanning (T1046), execution of commands (T1059.001), credential access via valid accounts (T1078), and use of remote access tools like AnyDesk (T1550.002). The operators run their own Tor-based data leak site, consistent with double extortion ransomware trends. Despite the low number of victims publicly listed, the exposure of the operator toolkit and indicators such as file hashes provides defenders with actionable intelligence. No known exploits are currently active in the wild, but the campaign’s modular nature and use of open-source code could facilitate rapid evolution and wider targeting. The medium severity rating reflects the moderate impact on confidentiality, integrity, and availability, combined with the need for authentication and some user interaction for initial access.
Potential Impact
Yurei ransomware poses a significant threat to organizations by combining data encryption with the risk of sensitive data leakage, increasing pressure on victims to pay ransoms. The double extortion tactic can cause severe reputational damage, legal liabilities, and operational disruption. The use of open-source ransomware code lowers the barrier for attackers to customize and deploy variants, potentially increasing the campaign’s reach. The inclusion of credential theft and remote access tools enables lateral movement within networks, escalating the risk of widespread compromise. Although the current victim count is low, the campaign’s presence on the Tor leak site indicates active extortion attempts. Organizations with inadequate network segmentation, weak credential management, or exposed remote access services are particularly vulnerable. The medium severity suggests that while the threat is not yet widespread or highly destructive, it has the potential to cause moderate to significant operational and financial impacts if successfully deployed.
Mitigation Recommendations
Organizations should implement multi-factor authentication (MFA) across all remote access and privileged accounts to mitigate credential abuse. Network segmentation and strict access controls can limit lateral movement and contain infections. Continuous monitoring for unusual network scanning activity (T1046) and command execution (T1059.001) is critical to early detection. Deploy endpoint detection and response (EDR) solutions capable of identifying ransomware behaviors and known Yurei indicators, including the provided file hashes. Restrict or monitor the use of remote access tools like AnyDesk, ensuring they are only used when necessary and secured properly. Regularly back up critical data with offline or immutable storage to enable recovery without paying ransom. Conduct phishing awareness training to reduce the risk of initial compromise. Finally, monitor Tor sites and threat intelligence feeds for updates on Yurei activity and indicators to stay ahead of evolving tactics.
Affected Countries
Morocco, United States, United Kingdom, Germany, France, Canada, Australia, Japan, South Korea, Brazil
Indicators of Compromise
- hash: 964540e24c4e2e048e4600e5f590bf96
- hash: d4757f035c3447c33c2347101d08c1e798f1a044
- hash: 1facf7cdd94eed0a8a11b30f4237699385b20578339c68df01e542d772ccbce5
- hash: 26f51df1a12230b6bb583f3003c102a79106b049f89d9b9d43c6e85e072bd99e
- hash: 4f88d3977a24fb160fc3ba69821287a197ae9b04493d705dc2fe939442ba6461
- hash: ebfe75ab3223b036a4b886d497f2b172425b3e63890d485c99353773d4c436ea
Stranger Strings: Yurei Ransomware Operator Toolkit Exposed
Description
Active since September 2025, Yurei is a double extortion ransomware campaign. The operators run their own Tor data leak site with a low number of victims listed at the time of writing. It is reportedly derived from Prince Ransomware, an open-source ransomware family written in Go. Check Point researchers noted that all samples were first submitted to VirusTotal from Morocco, and that one sample did not include a ticket ID, indicating that this could be a test build, possibly uploaded by the developer themselves. Yurei ransomware samples also contained a link to SatanLockv2, based on the presence of the PDB path string “D:\satanlockv2” present in the Yurei samples.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Yurei ransomware campaign, active since September 2025, represents a double extortion threat where attackers encrypt victim data and threaten to leak stolen information via a Tor-hosted leak site. Yurei is reportedly derived from Prince Ransomware, an open-source ransomware family written in the Go programming language, which facilitates rapid development and deployment. Check Point researchers observed that all known samples were initially submitted to VirusTotal from Morocco, suggesting possible origin or testing activities in that region. One sample lacked a ticket ID, indicating it may be a developer test build. Notably, Yurei samples contain references to SatanLockv2 ransomware, implying shared code or toolkits between these ransomware families. The campaign uses multiple tactics including network scanning (T1046), execution of commands (T1059.001), credential access via valid accounts (T1078), and use of remote access tools like AnyDesk (T1550.002). The operators run their own Tor-based data leak site, consistent with double extortion ransomware trends. Despite the low number of victims publicly listed, the exposure of the operator toolkit and indicators such as file hashes provides defenders with actionable intelligence. No known exploits are currently active in the wild, but the campaign’s modular nature and use of open-source code could facilitate rapid evolution and wider targeting. The medium severity rating reflects the moderate impact on confidentiality, integrity, and availability, combined with the need for authentication and some user interaction for initial access.
Potential Impact
Yurei ransomware poses a significant threat to organizations by combining data encryption with the risk of sensitive data leakage, increasing pressure on victims to pay ransoms. The double extortion tactic can cause severe reputational damage, legal liabilities, and operational disruption. The use of open-source ransomware code lowers the barrier for attackers to customize and deploy variants, potentially increasing the campaign’s reach. The inclusion of credential theft and remote access tools enables lateral movement within networks, escalating the risk of widespread compromise. Although the current victim count is low, the campaign’s presence on the Tor leak site indicates active extortion attempts. Organizations with inadequate network segmentation, weak credential management, or exposed remote access services are particularly vulnerable. The medium severity suggests that while the threat is not yet widespread or highly destructive, it has the potential to cause moderate to significant operational and financial impacts if successfully deployed.
Mitigation Recommendations
Organizations should implement multi-factor authentication (MFA) across all remote access and privileged accounts to mitigate credential abuse. Network segmentation and strict access controls can limit lateral movement and contain infections. Continuous monitoring for unusual network scanning activity (T1046) and command execution (T1059.001) is critical to early detection. Deploy endpoint detection and response (EDR) solutions capable of identifying ransomware behaviors and known Yurei indicators, including the provided file hashes. Restrict or monitor the use of remote access tools like AnyDesk, ensuring they are only used when necessary and secured properly. Regularly back up critical data with offline or immutable storage to enable recovery without paying ransom. Conduct phishing awareness training to reduce the risk of initial compromise. Finally, monitor Tor sites and threat intelligence feeds for updates on Yurei activity and indicators to stay ahead of evolving tactics.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.team-cymru.com/post/yurei-double-extortion-ransomware-campaign-toolkit"]
- Adversary
- null
- Pulse Id
- 69cd66412a30a525e66b507d
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash964540e24c4e2e048e4600e5f590bf96 | — | |
hashd4757f035c3447c33c2347101d08c1e798f1a044 | — | |
hash1facf7cdd94eed0a8a11b30f4237699385b20578339c68df01e542d772ccbce5 | — | |
hash26f51df1a12230b6bb583f3003c102a79106b049f89d9b9d43c6e85e072bd99e | — | |
hash4f88d3977a24fb160fc3ba69821287a197ae9b04493d705dc2fe939442ba6461 | — | |
hashebfe75ab3223b036a4b886d497f2b172425b3e63890d485c99353773d4c436ea | — |
Threat ID: 69cd7428e6bfc5ba1def5b1b
Added to database: 4/1/2026, 7:38:16 PM
Last enriched: 4/2/2026, 12:13:51 PM
Last updated: 4/6/2026, 4:56:16 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.