Remove Dharma .zzzzz Files Virus and Restore the Data - How to, Technology and PC Security Forum |

Remove Dharma .zzzzz Files Virus and Restore the Data

dharma-ransomware-readme-txt-file-sensorstechforum-remove-restore-filesYet another variant of the notorious Dharma ransomware has been detected in the wild, this time using the .zzzzz file extension mimicking the notorious Locky ransomware. This ransomware which was recently discovered is claimed by malware researchers to be an updated version of CrySiS ransomware variants with more sophisticated encryption and decryption. Users who have paid the ransom of 3 BTC requested by the Dharma crooks after it encrypts the files report that they are provided software with which they scan their computer and get a unique key only to send it back to the cyber-criminals and then get the decryptor. Even though it is tempting, we highly advise against following any guidelines of the README.txt and .jpg files dropped by Dharma after the infection and instead read the following article to learn how to remove dharma ransomware from your computer and how to try and restore your missing files.

Threat Summary


Dharma .zzzzz

Short DescriptionDharma encrypts user files and leaves as contact e-mail addresses to contact the criminals behind it and pay the ransom fee.
SymptomsChanges file extension of encrypted files to .zzzzz and the e-mail address for contact. Changes wallpaper to one with ransom instructions that have the backup ransom e-mail. Adds ransom notes in README.txt and README.jpg files.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by Dharma .zzzzz


Malware Removal Tool

User ExperienceJoin our forum to Discuss Dharma .zzzzz.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Dharma .zzzzz Ransomware – More Information

Distribution of Dharma

The first stage of getting infected by this virus is to interact with malicious objects. So far, concerning this variant of Dharma ransomware, it’s methods of infecting are similar to the other .wallet and .dharma variants. The virus may utilize a mixture of tools to cause an infection:

  • Obfuscation malware to activate the payload dropper without any security software noticing it.
  • Exploit kits to download the payload of the virus without the user noticing.
  • Spamming software to spread spam messages with malicious attachments.
  • Archivers to archive the malware and hide it from spam filters and malware checks online.
  • Malicious scripts to cause an infection via a malicious web links or .hta, .htm, html, .js, .wsf or other similar files or macros in infected Microsoft Office or Adobe documents.

All of these tools may be used in a variety of combination to get users infected by this ransomware virus. It may come onto your computer via a malicious URL posted on social media websites, like Facebook, Twitter and other web pages, causing redirects to a scripted host. Another scenario is if you receive such a web link directly via a message from a compromised account, like a Skype message for example, saying “Check this out :D”. There is also the potential scenario of becoming infected with the .zzzzz variant of Dharma ransomware via spammed e-mail messages that contain a malicious attachment masked as a .zip .rar or other archived “document”, pretending to be an invoice. Furthermore, you can become infected by Dharma ransomware as a result of clicking on an advertisement caused by a potentially unwanted program (PUP) on your computer. Also, it is less likely but it is possible to become infected by the .zzzzz variant by simply opening a suspicious file downloaded via torrents uploaded by the hackers on a p2p website.

Dharma .zzzzz Version – Post-Infection Analysis

After having infected users with malware, Dharma ransomware is very specific on it’s activity. For starters, it may begin to kill any processes that might interfere with it’s encryption process or file dropping, using different versions of the taskkill command:

→ taskkill /pid 1230 /pid 1241 /pid 1253
taskkill /f /fi “USERNAME eq NT AUTHORITY\SYSTEM” /im notepad.exe
taskkill /s srvmain /f /im notepad.exe
taskkill /s srvmain /u maindom\hiropln /p [email protected] /fi “IMAGENAME eq note*” /im *
taskkill /s srvmain /u maindom\hiropln /fi “USERNAME ne NT*” /im *
taskkill /f /fi “PID ge 1000” /im *

After having done, this, Dharma .zzzzz ransomware may create different files in the dominant Windows folders. The files may have different functions and have different names, for example:

commonly used file names and folders

After this is done, Dharma .zzzzz variant may begin to scan a wide variety of file types to encrypt, including videos, photos, various documents, audio files, pictures and other types of files. Similar to CrySiS, it may begin to hunt for the following types of files:

→ .odc, .odm, .odp, .ods, .odt, .docm, .docx, .doc, .odb, .mp4, sql, .7z, .m4a, .rar, .wma, .gdb, .tax, .pkpass, .bc6, .bc7, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps

After encryption, the files appear in proximity to the following:


In addition to this, the ransomware is also reported render the files completely non-openable after encoding and to leave behind a ransom note asking to contact an e-mail. The note is contained in a README.txt or README.jpg file and may be the following:

At the moment, your system is not protected.
We can fix it and restore files.
To restore the system write to this address:
[email protected]

When the e-mail associated with Dharma .zzzzz ransomware is contacted, the cyber-criminals request amount somewhere between 2 and 3 BTC depending on the importance of the files. In some instances they were also willing to bring down the price down to 1 BTC. After the victim pays the ransom, he is provided with a scanning software:


This scanning software aims to scan for and discover what seems to be a public key and appears like the following:

decryption-key-dharma-ransowmare-sensorstechforumSource:BleepingComputer Forums

This key is then inputted into the decryption software after which it discovers a decryption key which is used again with the “help” of the cyber-crooks and the software to decrypt the encoded files.


Remove Dharma .zzzzz Ransomware and Restore Encrypted Files

Even though it seems tempting, malware researchers and cyber-security experts strongly advise the victims of Dharma’s .zzzzz ransomware variant to focus on removing the ransomware virus and using alternative methods like the ones in the instructions in step “2. Restore files encrypted by Dharma .zzzzz”. Paying the ransom will only cause support the cyber-criminals’ malicious activity and let them develop and further spread this ransomware to infect other people.

But, before trying the alternative decryption instructions, we strongly urge you to perform the actions below:

1. Backup the encrypted files and create several copies of them.
2. Remove Dharma, preferably by following the instructions below.
3. Focus on trying to restore the files using alternative methods, like the ones we have suggested below in step “2. Restore files encrypted by Dharma”.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share