.bip Files Virus (Dharma Ransomware) – Remove and Restore Files

.bip Files Virus (Dharma Ransomware) – Remove and Restore Files

This article has been made in order to best explain to you how you can remove the latest version of Dharma ransomware virus and explain how you can recover as many encrypted files as possible, containing the .bip file extension.

We have encountered reports from multiple victims about new iteration of the notorious Dharma ransomware. The malware has the .bip file extension embedded to it and it’s main goal is to conduct a lot of malicious activities, which results in leaving your files encrypted with a combination of several encryption algoritms. These ciphers aim to render your files to remain no longer able to be opened and looking like the following: Filename.id{ID-here}.[restoresales@airmail.cc].bip. The malware also leaves behind a ransom note file, named FILES ENCRYPTED.txt, which aims to convince victims into paying a hefty ransom fee to recover their files back to normal. If your computer has fallen victim to the .bip version of Dharma, we advise that you read this article since it contains information that can help you to recover your encrypted files without paying ransom.

Threat Summary

Name.bip Dharma Virus
TypeFile Encryption Ransomware
Short DescriptionA new iteration of the Dharma/CrySiS ransomware viruses. Utilizes sophisticated encryption mode on data of infected machines in order to extort victims to pay in BitCoin for their encrypted files..
SymptomsEncrypts documents, images, videos and other important files and adds the .bip file suffix plus a unique ID and the e-mail to pay the ransom.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .bip Dharma Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .bip Dharma Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.bip Dharma Ransomware – Information Database:

.bip Files Virus - Update June 2018

.bip Files Virus – Update June 2018

The .bip files virus has been detected by security researchers to be spread even more vigorously since the beginning of June, 2018. The ransomware virus spammers use the same techniques – malicious e-mail attachments which infect the users via malicious macros. The chain of activities, leading to the successful infection is performed as the graphic underneath displays:

There has also been a new variant of Dharma ransomware to be released out in the wild, using the .combo file extension added to the encrypted files. The ransomware virus is based on the .cezar family of Dharma ransomware and you can find more information about it in the related article underneath:

.bip Files Virus - How Does It Infect

.bip Files Virus – How Does It Infect

In order to effectively infect the computers of victims, the .bip files virus uses a rather often used mean of distribution – via e-mails automatically sent to victims, in other words spam. These type of messages aim to convince victims to open a malicious attachment via trusting in its content in the sense that it is a legitimate document of some sort, for example:

  • An invoice for a purchase.
  • Banking statement document.
  • Receipt of a purchase.
  • Orders which you may or may not have conducted.
  • Other important files.

The e-mails which are sent, carry the infection file of Dharma ransomware, using the .bip file extension are made as if they come from people who are employees of companies in order to convince victims into opening them, for instance:

In addition to this, besides via e-mails of a spamming origin, the latest Dharma ransomware iteration could be spread via other means as well, such as claiming to be legitimate setups of software, keygens, patches or fixes for games and other software license activation files. If you look to download software online for free, we recommend that you always check the software via online scanners, like VirusTotal.

Dharma .bip Files Virus - Malicious Activity

Dharma .bip Files Virus – Malicious Activity

When the infection with this ransomware virus has taken place on your computer, the initial action of it is to conduct preparation type of activities, such as:

  • To create mutexes.
  • Interact with the Windows Registry Editor.
  • Delete system backups and shadow copies.
  • Change the wallpaper or automatically schedule the ransom note file to open on your desktop.
  • It may touch some of the Windows key files in order to obtain administrative privileges.

The main malicious file of the .bip variant of Dharma ransomware has been reported to be an executable type of file, with the following name and signature:

File size:431 KB

After the .bip version of Dharma ransomware has already dropped it’s infection file on the computers of victims, it may drop its payload files into the following directories of Windows:

  • %Local%
  • %Roaming%
  • %AppData%
  • %Temp%
  • %Windows%

After doing so, the .bip iteration of the Dharma virus may also begin to interact with the Windows Registry Editor. The malware may add Windows Registry entries in the Run and RunOnce registry sub-keys of Windows, with the following location:

→ HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\

These registry sub-keys are mainly the ones used if you want to run programs on Windows start-up and Dharma ransomware uses them to set it’s own settings to run the malicious files and other modules of it which perform nefarious activities on the infected PC automatically when you start Windows. One of those activities is to delete the Windows shadow volume copies, which is done via a script that is automatically executed and runs the following commands in Windows Command Prompt:

→ bcdedit /set bootstatuspolicy ignoreallfailures
bcdedit /set recoveryenabled No
bcdedit /set {default} bootstatuspolicy ignoreallfailures
bcdedit /set {default} recoveryenabled No
vssadmin delete shadows /for={volume} /oldest /all /shadow={ID of the Shadow} /quiet

The ransomware virus aims to perform multiple different types of activities in order to make sure the victim knows it’s presence. This includes dropping it’s ransom note in the files of the victim’s computer, which appears like the following:

Dharma .bip Ransomware - Encryption Process

Dharma .bip Ransomware – Encryption Process

Just like other variants of Dharma , this iteration uses the AES (advanced encryption standard) cipher that is classified as a Suite.B encryption algorithm and also used by the NSA for encrypting eyes-only types of files. This algorithm changes the data on the files of your computer so that they become no longer able to be opened. This activity then results in the Dharma ransomware leaving the files on your computer to seem as if they are corrupt and they cannot be opened by any form of software in the future.

The Dharma virus performs a scan before encrypting your files since the malware looks for types of files that contain the most often used file extensions, such as:


The .bip files variant of Dharma is clever enough not to encrypt files in those folders:

  • %Windows%
  • %System32%
  • %System%
  • %Local%
  • %Temp%
  • %Program Files%

This is a preventive measure to leave your computer intact while you cannot use your important documents. The files which are encrypted by Dharma ransomware start to appear like the following image shows:

After they are encrypted, the .bip files can no longer be opened via any program and their code structure has been replaced with data from the AES encryption cipher. This cipher generates an asymmetric decryption key which can be used only by the cyber-criminals in a special type of software designed to decrypt those files. So the only chance of getting all the files back is by either the crooks releasing the decryption key to the public, malware researchers cracking the virus and locating a master decryption key or you paying the ransom. But do not despair and do not support them by paying the ransom – there are other ways via which you can try and recover .bip encrypted files as well. Keep reading this article to understand how to remove the .bip variant of Dharma ransomware and get your files back.

Remove Dharma Ransomware and Restore .bip Encrypted Files

Removing Dharma ransomware is the best method to go for and a recommended way to do it is via following the instructions underneath this article. They have been created to explain step by step how to remove Dharma ransomware manually if you have the time and experience in malware removal. If not, the we’d advise you what most experts advise users – to download an advanced anti-malware software. This type of software will effectively make sure to get rid of all of the malicious files that are associated with the .bip file version of Dharma ransomware and protect your PC against future infections automatically.

If you want to restore files, encrypted with the .bip file extension, do not despair, because there are several alternative methods which you can try. They are located in step “2. Restore files encrypted by .bip Dharma Virus” and they have been created in order to help you restore as many files as possible without having to pay the ransom, even though there is not 100% chance you may be able to recover all of your files, encrypted by this malware.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share