Malware News Stranger Strings: Yurei Ransomware Operator Toolkit Exposed

Khushal

Level 14
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
697
4,125
1,269

Active since September 2025, Yurei is a double extortion ransomware campaign. The operators run their own Tor data leak site with a low number of victims listed at the time of writing. It is reportedly derived from Prince Ransomware, an open-source ransomware family written in Go.
 
Context

I cannot verify that claim directly from the quoted text alone, and I would be careful about treating any single write-up as final attribution.

What can be said safely

  • If Team Cymru published that analysis, it is reasonable to treat it as a serious threat-intelligence source.
  • “Double extortion” usually means the attackers both encrypt data and threaten to leak stolen data.
  • A claim that Yurei is derived from Prince Ransomware sounds plausible in a technical sense because many ransomware families reuse leaked or open-source code, but that still needs confirmation from reverse-engineering or multiple independent reports.
  • A “low number of victims listed” on a leak site does not reliably indicate the actual scale of operations. Leak sites are often incomplete, delayed, or intentionally selective.

Important caution

Threat reporting on active ransomware campaigns can change quickly. Naming, family lineage, victim counts, and TTP attribution are sometimes revised as more samples are analyzed.

Practical takeaway

For forum discussion purposes, the safest phrasing would be:

  • Yurei is being reported as a double extortion ransomware operation.
  • According to the cited Team Cymru analysis, it may be related to or derived from Prince Ransomware.
  • That lineage should be treated as an analytical assessment unless confirmed by additional technical reporting.

If members want to validate it further

The best next steps are:

  • Check whether the Team Cymru post includes IOCs, code overlaps, ransom note similarities, or builder artifacts.
  • Look for corroboration from other reputable sources such as CERTs, major security vendors, or incident-response teams.
  • Compare reported TTPs against MITRE ATT&CK mappings and published sample analysis.

Conclusion

The quoted statement is plausible, but it should be presented as a reported analysis rather than an established fact unless there is supporting technical evidence from multiple credible sources.
 
  • Like
Reactions: Halp2001
Executive Summary
The provided intelligence details the operational toolkit of the Yurei double-extortion ransomware campaign, discovered via exposed open directories hosted on AWS infrastructure. The toolkit includes a mix of legitimate administrative utilities, offensive security tools, and custom PowerShell scripts used for reconnaissance, defense evasion, and payload execution. While the exact initial access vector is unconfirmed, the presence of zip files resembling infostealer logs suggests reliance on purchased stolen credentials.

Technical Analysis & Remediations

MITRE ATT&CK Mapping

T1078 Valid Accounts

Suspected initial access via stolen credentials.

T1046 Network Service Discovery
Usage of SoftPerfect NetScan and NetExec.

T1550.002 Use Alternate Authentication Material
Pass the Hash: Evidenced by Invoke-TheHash.ps1 and Rubeus.exe.bak.

T1562.001 Impair Defenses
Disable or Modify Tools: FixingIssues2.ps1 targets Windows Defender and disables System Restore via Group Policy.

T1490 Inhibit System Recovery
Execution of "vssadmin delete shadows /all /quiet".

T1546.003 Event Triggered Execution
Windows Management Instrumentation Event Subscription: Vecna.ps1 establishes persistence via WMI to execute the ransomware binary.

T1486 Data Encrypted for Impact
The final payload, StrangerThings[.]exe, is the Golang-based Yurei ransomware.

CVE Profile
N/A (Exploitation of specific CVEs is not detailed in the source telemetry; the attack relies heavily on credential abuse and Living off the Land (LotL) techniques).

Telemetry

IPs

44.210.101[.]86
44.223.40[.]182 (AS14618 - Amazon).

Hashes (SHA256)
1facf7cdd94eed0a8a11b30f4237699385b20578339c68df01e542d772ccbce5 (Host_Discovery.ps1).

ebfe75ab3223b036a4b886d497f2b172425b3e63890d485c99353773d4c436ea (FixingIssues2.ps1).

4f88d3977a24fb160fc3ba69821287a197ae9b04493d705dc2fe939442ba6461 (StrangerThings[.]exe).

Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)

GOVERN (GV) – Crisis Management & Oversight

Command
Integrate Yurei IOCs and associated LotL binary profiles into the organizational threat intelligence platform.

DETECT (DE) – Monitoring & Analysis

Command
Implement SIEM alerts for vssadmin delete shadows commands and unauthorized usage of AnyDesk[.]exe, Everything[.]exe, and PsExec.

Command
Hunt for WMI persistence mechanisms matching the behavior of Vecna.ps1, specifically looking for triggers tied to explorer.exe startup.

RESPOND (RS) – Mitigation & Containment

Command
Block inbound/outbound communications to AWS IPs 44.210.101[.]86 and 44.223.40[.]182.

Command
Isolate endpoints exhibiting rapid internal scanning behavior (resembling NetScan/NetExec activity) or unauthorized modifications to Windows Defender exclusions.

RECOVER (RC) – Restoration & Trust

Command
Ensure offline, immutable backups are maintained, as the adversary actively disables System Restore and deletes shadow copies.

IDENTIFY & PROTECT (ID/PR) – The Feedback Loop

Command
Enforce MFA across all remote access and VPN portals to mitigate the risk of initial access via stolen infostealer logs.

Command
Restrict the execution of PowerShell scripts (.ps1) to signed, administrative operations only.

Remediation - THE HOME USER TRACK (Safety Focus)

Priority 1: Safety

Command
If you suspect a Yurei infection, disconnect from the internet immediately to prevent the exfiltration of your data (the "double extortion" aspect).

Command
Do not log into banking/email until the device is verified clean.

Priority 2: Identity

Command
Since the attackers likely use stolen passwords from "infostealer logs," change critical passwords using a known clean device.

Priority 3: Persistence

Command
Verify that your Windows Defender settings have not been tampered with (e.g., exclusions added for the entire C:\ drive), as the attackers use scripts to silently disable security features.

Hardening & References

Baseline

CIS Microsoft Windows Desktop/Server Benchmarks (Focus: PowerShell Execution Policies, Credential Guard, LSA Protection).

Framework
NIST CSF 2.0 / SP 800-61r3.

Source

Team Cymru
 
  • Like
Reactions: harlan4096
For the home user, what deserves attention are the everyday security habits. Yurei may look like a campaign aimed at companies, but the entry point often comes from stolen credentials or small daily oversights. That means a home user can also be affected if their passwords end up circulating in malware logs or underground forums.

Practical steps make the difference:

  • Change critical passwords from a clean device if you suspect something is wrong.
  • Check that Windows Defender or any other protection hasn’t been disabled without your knowledge.
  • Keep backups outside your main device, because ransomware doesn’t care whether you’re a company or an individual.
In short, daily discipline at home remains the best defense, since these campaigns thrive on small lapses in routine. 🔒 🖥️ 💾
 
  • Like
Reactions: lokamoka820