PULSE NAME
Stranger Strings: Yurei Ransomware Operator Toolkit Exposed
WHITE AlienVault 2026-04-01 Modified: 2026-04-01
6
IOCs
LOW VOLUME
Active since September 2025, Yurei is a double extortion ransomware campaign. The operators run their own Tor data leak site with a low number of victims listed at the time of writing. It is reportedly derived from Prince Ransomware, an open-source ransomware family written in Go. Check Point researchers noted that all samples were first submitted to VirusTotal from Morocco, and that one sample did not include a ticket ID, indicating that this could be a test build, possibly uploaded by the developer themselves. Yurei ransomware samples also contained a link to SatanLockv2, based on the presence of the PDB path string “D:\satanlockv2” present in the Yurei samples.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
Indicators of Compromise (6)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 964540e24c4e2e048e4600e5f590bf96 2026-04-01
FileHash-SHA1 d4757f035c3447c33c2347101d08c1e798f1a044 2026-04-01
FileHash-SHA256 1facf7cdd94eed0a8a11b30f4237699385b20578339c68df01e542d772ccbce5 2026-04-01
FileHash-SHA256 26f51df1a12230b6bb583f3003c102a79106b049f89d9b9d43c6e85e072bd99e 2026-04-01
FileHash-SHA256 4f88d3977a24fb160fc3ba69821287a197ae9b04493d705dc2fe939442ba6461 2026-04-01
FileHash-SHA256 ebfe75ab3223b036a4b886d497f2b172425b3e63890d485c99353773d4c436ea 2026-04-01