Dharma ransomware infection has been reported to be spread in a new ransomware variant that is using the .onion file extension and the e-mail address [[email protected]]. The ransomware virus is believed to be extremely similar to the latest CrySiS Globe ransomware infection, using the file extension .[[email protected]].onion. The relation between the two ransomware viruses may be due to them both being part of the CrySiS ransomware family. In case you have become a victim of the Dharma .onion ransomware, we recommend you to read this article thoroughly.
|Short Description||.Onion virus, also calling itself Dharma encrypts user files and leaves as contact e-mail addresses to contact the criminals behind it and pay a ransom fee to restore encrypted files.|
|Symptoms||Changes file extension of encrypted files to .onion. Changes wallpaper to one with ransom instructions that have ransom e-mail.|
See If Your System Has Been Affected by Dharma .onion
Malware Removal Tool
|User Experience||Join our forum to Discuss Dharma .onion.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Update June 2017 – New Data Recovery Method
It has been brought to our attention that victims of the latest Dharma .onion ransomware infection variants have managed to restore a very high percentage (over 90%) of their files using a very unique method – converting files into virtual drives and then using partition recovery option on data recovery programs. This method takes advantage of the converting the files into a .VHD file type which is a virtual drive. Since there are new data recovery programs specifically designed to recover partitions, one approach is to restore files encrypted by Dharma ransomware is to convert the encrypted files into .VHD files and then try to recover them using partition recovery software. Since the algorithm that encrypts files actually alters only a small portion of the file, you have a much higher chance of recovering the files if you change them into .VHD type.
The methods have been reported to not be a full guarantee to recover all the files, but if you haven’t reinstalled your operating system yet, we advise you to follow them. But first, make sure to remove Dharma’s malicious files from the instructions at the bottom of these article. Here are the instructions:
Dharma .onion File Virus – More Information
Dharma ransomware is a file-encrypting type of infection that aims for one thing only – to render important documents and other files on the infected computer corrupt and ask a ransom to be paid for their decryption.
Dharma .onion Virus Files – Distribution
The distribution of the .onion virus files is conducted in more than one way. For the distribution, different tools and programs may be utilized, like:
- Exploit kit.
- File Joiners.
- Executable files that are obfuscated.
- Online hosts for distribution where the malicious files are stored.
- Websites for the command and control server.
- Spam services or spamming software.
The combination of these tools may result in the infection of Dharma ransomware’s .onion variant on multiple different locations:
- Spammed as e-mail messages that contain malicious e-mail attachments or web links.
- Sent via online chat programs.
- Spammed via social media.
The most often used technique for the distribution of malicious files is via spammed e-mail messages that contain deceptive information, such as fake invoice of a purchase the victim has not made or other scamming claims. One example of such e-mail containing malicious attachment can be seen below:
Dharma .onion Ransomware – Malicious Activity
Once a malicious file or script has been activated, Dharma .onion ransomware’s payload may be dropped via a loader, dropper or a downloader malware which self-deletes afterwards. The malicious files off the virus may exist in the key Windows folders under different names:
As soon as this variant of Dharma ransomware has dropped it’s malicious files on the compromised computer, the virus could modify the Run and RunOnce Windows registry sub-keys. In those keys, values may be added that modify the wallpaper and automatically open files on system startup. One of those files may be the malicious file of Dharma .onion virus which causes the encryption process.
In addition to this process, Dharma ransomware may also execute multiple different iterations of the vssadmin command as an administrator. The command is for Windows Command Prompt and looks like the following:
Usually the delete-shadows part of the command, means that Dharma .onion ransomware may delete volume shadow copies to make file restoration via Windows backup impossible.
Other suspicious activity of the .onion Dharma ransomware include the creating of a folder, named “data” in %System Drive%.
.onion Dharma – Encryption Activity
The process of encoding files by Dharma is similar to the one used by the older variant of the virus. At the start, the virus begins to scan whether or not it is ran on a virtual drive and if so, it may shut down and self-delete. If not, the ransomware begins to scan your computer for important files, such as:
- Microsoft Office documents.
- Adobe .PDF documents.
- Virtual drive images.
- Photos and other image files.
- Music and other audio data.
- System image files.
- Files related to often used software.
As soon as these pre-configured set of files Dharma .onion is programmed to scan are detected, the virus may append the Advanced Encryption Algorithm on them, otherwise known as AES. The AES cipher replaces blocks of data on the files with symbols from the algorithm. This renders the files no longer openable and they seem corrupt. After the encryption process has completed, Dharma ransomware leaves the files with the .onion file extension, making them look like the following:
After the encryption process has completed, Dharma .onion ransomware generates unique keys and may leave a ransom note with clear demands to make a ransom payoff in BitCoin in order to restore the encrypted files. Upon payment from the victim, he or she receives via the mail in the extension a message with the software which scans for the key. After the key is scanned and copied and sent back to the cyber-crooks, they send back a unique decrypter with the embedded decryption key corresponding to the public one sent by the victim wo scanned it.
Remove Dharma Ransomware and Restore .onion Encrypted Files
Viruses like Dharma have previously been decrypted as it happened with the first variant using the .dharma file extension. This is why it is strongly recommended to backup your encrypted files before removing the virus.
For the removal process of Dharma ransomware, recommendations are to focus on following the removal instructions below. They will help isolate this variant of Dharma ransomware after which remove the malicious files. In case manual removal may represent difficulty to you, security experts always give recommendations to download and install an advanced anti-malware program on your computer. It will ensure that Dharma .onion ransomware is permanently removed automatically and will protect your computer in real-time as well.
Regarding the situation with the encrypted files, malware researchers advise not to pay any ransom to the virus. They keep monitoring the virus and hopefully should come up with decryption instructions soon. In the meantime, we advise you to perform the actions the following steps:
1. Backup the encrypted files and create several copies of them.
2. Remove Dharma, preferably by following the instructions below.
3. Focus on trying to restore the files using alternative methods, like the ones we have suggested below in step “2. Restore files encrypted by Dharma .onion”.
Manually delete Dharma .onion from your computer
Note! Substantial notification about the Dharma .onion threat: Manual removal of Dharma .onion requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.