The .bat file extension is a suffix that is used by Dharma ransomware after it infects a computer. This is a virus that aims to encode your files and stop you from opening them until you pay a ransom in BitCoin. Since this is a very dangerous virus, we do recommend that you read this article thoroughly if your computer has been infected by the .bat files virus.
|Short Description||Aims to encrypt the files on the infected computer with AES-256 and then ask victims to pay BitCoin to get the files back.|
|Symptoms||Files have the .bat file extension added alongside their original one with an e-mail and a unique ID and cannot be opened. The virus also adds a ransom note.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool|| See If Your System Has Been Affected by .BAT Ransomware |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .BAT Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.BAT Ransomware – How Did I Get It and What Does It Do?
The primary method that is used by Dharma ransomware to infect computers is likely done via the infection file being sent to you as a result of a malicious spam via e-mail. These e-mails contain the virus file added as an attachment and this file may pretend to be:
- An invoice.
- A receipt for an order.
- An important document from your bank.
- Something work-related.
- Security document sent to recover missing password or something similar.
Another possible scenario for replication is if the virus file of .BAT ransomware is directly uploaded on several different types of sites that are compromised and to appear as if it is some sort of seemingly legitimate software download. Usually, these types of virus files can pretend to be:
- Portable programs.
- Key generators.
Once the victim downloads the virus file and executes it, infection with .BAT ransomware is inevitable. The outcome of this infection is that the Dharma .BAT ransomware may immediately scan for and encrypt the following types of files:
→ “PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG”
When this variant of Dharma ransomware encrypts your files, it replicates bytes of data from those files with the same data scrambled with AES-256 encryption algorithm. When the .bat variant of Dharma encrypts your files, it then ads a unique ID plus the e-mail of the crooks and the .bat extension, so the files begin to appear like the following:
Then, the virus may drop it’s ransom note file, that has the following message to victims:
→ All FILES ENCRYPTED “RSA1024”
All YOUR FILES HAVE BEEN ENCRYPTED!!! IF YOU WANT TO RESTORE THEM, WRITE US TO THE E-MAIL [email protected]
IN THE LETTER WRITE YOUR ID, YOUR ID 1E857D00
IF YOU ARE NOT ANSWERED, WRITE TO EMAIL:[email protected]
YOUR SECRET KEY WILL BE STORED ON A SERVER 7 DAYS, AFTER 7 DAYS IT MAY BE OVERWRITTEN BY OTHER KEYS, DON’T PULL TIME, WAITING YOUR EMAIL
FREE DECRYPTION FOR PROOF
You can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)
When you make sure of decryption possibility transfer the money to our bitcoin wallet. As soon as we receive the money we will send you:
1. Decryption program.
2. Detailed instruction for decryption.
3. And individual keys for decrypting your files.
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
In addition to those activities, the .bat variant of Dharma ransomware may also perform the following activities:
- Create mutexes.
- Obtain administrator rights.
- Perform spyware or Trojan-like activities.
- Interfere with Windows Registries to auto-run on startup.
- Collect the system information from your PC.
Remove .BAT Ransomware and Try Restoring Files
In order for you to remove the .BAT ransomware from your computer, we stronlgy recommend that you focus on following the removal instructions underneath. They have been created to help delete this virus either by yourself or in combination with a professional malware removal software. Such program will effectively make sure to uninstall all virus files, related to .BAT ransomware by scanning and detecting them.
If you want to try and recover files, encrypted with .BAT extension, we strongly suggest that you try out the alternative file recovery methods underneath. They may not come with a 100% file recovery guarantee, but with their aid, you could restore some files.