← Back to Pulse Feed
PULSE DETAIL
PULSE NAME
Stranger Strings: Yurei Ransomware Operator Toolkit Exposed
Active since September 2025, Yurei is a double extortion ransomware campaign. The operators run their own Tor data leak site with a low number of victims listed at the time of writing. It is reportedly derived from Prince Ransomware, an open-source ransomware family written in Go. Check Point researchers noted that all samples were first submitted to VirusTotal from Morocco, and that one sample did not include a ticket ID, indicating that this could be a test build, possibly uploaded by the developer themselves. Yurei ransomware samples also contained a link to SatanLockv2, based on the presence of the PDB path string “D:\satanlockv2” present in the Yurei samples.
Indicators of Compromise (6)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| FileHash-MD5 | 964540e24c4e2e048e4600e5f590bf96 | — | 2026-04-01 | |
| FileHash-SHA1 | d4757f035c3447c33c2347101d08c1e798f1a044 | — | 2026-04-01 | |
| FileHash-SHA256 | 1facf7cdd94eed0a8a11b30f4237699385b20578339c68df01e542d772ccbce5 | — | 2026-04-01 | |
| FileHash-SHA256 | 26f51df1a12230b6bb583f3003c102a79106b049f89d9b9d43c6e85e072bd99e | — | 2026-04-01 | |
| FileHash-SHA256 | 4f88d3977a24fb160fc3ba69821287a197ae9b04493d705dc2fe939442ba6461 | — | 2026-04-01 | |
| FileHash-SHA256 | ebfe75ab3223b036a4b886d497f2b172425b3e63890d485c99353773d4c436ea | — | 2026-04-01 |