Remove DilmaLocker Ransomware - Restore .__dilmaV1 Files
THREAT REMOVAL

Remove DilmaLocker Ransomware – Restore .__dilmaV1 Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by DilmaLocker and other threats.
Threats such as DilmaLocker may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article will help you to remove DilmaLocker ransomware fully. Follow the ransomware removal instructions given at the bottom.

DilmaLocker is a ransomware virus that encrypts your files, while also appends the .__dilmaV1 extension to them. The DilmaLocker virus displays a ransom note message and changes your Windows background with an image of Dilma Rousseff. Ransom notes are found inside the files called “RECUPERE_SEUS_ARQUIVOS.html” and “dilminha.dat“. These ransom messages are filled with instructions about paying a ransom of 3,000 Brazillian Reias converted in Bitcoin cryptocurrency, for supposedly recovering your file data. Continue to read below to see how you could try to potentially restore some of your files.

Threat Summary

NameDilmaLocker
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer and displays a ransom message afterward.
SymptomsThe ransomware will encrypt your files and put up a ransom note inside a text file.
Distribution MethodSpam Emails, Email Attachments, Executables
Detection Tool See If Your System Has Been Affected by DilmaLocker

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss DilmaLocker.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

DilmaLocker Ransomware – Infection

DilmaLocker ransomware could spread its infection with various methods. A payload dropper which initiates the malicious script for this ransomware is being spread around the World Wide Web, and researchers have gotten their hands on a malware sample. If that file lands on your computer system and you somehow execute it – your computer system will become infected. You can see the detections of such a file on the VirusTotal service right here:

As shown above, the file has been disguised as a .pdf, while it is actually a binary file.

DilmaLocker ransomware might also distribute its payload file on social media and file-sharing services. Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Refrain from opening files right after you have downloaded them. You should first scan them with a security tool, while also checking their size and signatures for anything that seems out of the ordinary. You should read the tips for preventing ransomware found in our forums.

DilmaLocker Ransomware – Overview

DilmaLocker is the name of a cryptovirus that might be considered to be part of a hacktivism agenda, given that it is named after Dilma Rousseff, the former president of Brazil. The following malware threats are also involved in some form of hacktivism:

The virus will change your Desktop background with her image and will encrypt your files and then extort you to pay a ransom to supposedly recover them. The ransomware might be targeted only at Brazillian speaking users, but it seems unlikely to be only aim.

The ransomware also pops up this notification:

DilmaLocker ransomware might make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows environment. Such entries are typically designed in a way to launch the virus automatically with each start of the Windows Operating System.

The note can be previewed right down here, from the following screenshot:

The note is inside a file called “RECUPERE_SEUS_ARQUIVOS.html” and reads the following:

* * * ATENÇÃO * * *

Todos os seus arquivos foram criptografados pelo vírus Dilma Locker

Mas calma, nos temos uma solução

O custo para descriptografar seus arquivos é de R$3000,00 ( três mil reais)

Não pode pagar? Tenha calma, vamos negociar, queremos apenas te ajudar 😉

Você tem direito a descriptografar um arquivo de graça. Escolha um e envie-nos por email ( até 3mb ).

O pagamento é aceito apenas em bitcoin. Não sabe usar? A gente ensina!

Todos os seus arquivos mais importantes foram criptografados utilizando o algoritmo AES de 256 bits.
Mesma criptografia utilizada pelo governo americano para proteger segredos de estado.
Ou seja, é IMPOSSÍVEL recuperar seus arquivos sem a senha correta.

Caso haja interesse em obter essa senha e recuperar seus arquivos, envie um email para [email protected]
contendo o arquivo dilminhadat que foi criado em sua área de trabalho ( ele é seu identificador pessoal, não o perca ).

Não existe outra maneira de recuperar seus arquivos sem nossa ajuda, qualquer programa ou anti-vírus que você
Utilize irá corromper seus arquivos e você perderá eles para sempre.

Assim que você nos enviar o pagamento, vamos te enviar a senha e o programa que ira fazer a descriptografia.
Quer alguma garantia? Envie-nos qualquer arquivo criptografado que iremos descriptografar e te devolver de graça.
Mas ande logo, em 4 dias seus arquivos serão deletados e nunca mais você irá recupera-los.

Aguardamos contato 🙂

Eu vivo de crime de computador porque não tenho tantas opções para viver com dignidade dentro do sistema.

The ransom note message with instructions roughly translated in English reads the following:

* * * ATTENTION * * *

All your files have been encrypted by the Dilma Locker virus

Be calm, we have a solution

The cost to decrypt your files is $ 3000.00 (three thousand reais)

Can not afford it? Take it easy, let’s negotiate, we just want to help you;)

You have the right to decrypt a file for free. Choose one and send us by email (up to 3mb).

Payment is only accepted in bitcoin. Do not know how to use it? We will teach you!

All of your most important files were encrypted using the 256-bit AES algorithm.
Same encryption used by the US government to protect state secrets.
That’s right, it is IMPOSSIBLE to recover your files without the correct password.

If you are interested in obtaining this password and recovering your files, please send an email to [email protected]
containing the dilminha.dat file that was created on your desktop (it’s your personal identifier, do not miss it).

There is no other way to recover your files without our help, any program or anti-virus that you use will corrupt your files and you will lose them forever.

Once you send us the payment, we will send you the password and the program that will decrypt.
Want some guarantee? Send us any encrypted file and we will decrypt and return it for free.
But walk away, in 4 days your files will be deleted and you will never recover them again.

Looking forward to seeing you 🙂

I live from computer crime because I do not have so many options to live with dignity within the system.

The note of the DilmaLocker ransomware states that your files are encrypted and that you need to pay 3,000 Brazillan Reias in the Bitcoin cryptocurrency, which equals 972 US dollars at the time of writing. However, you should NOT pay any ransom sum demanded by the crooks. That may only inspire the cybercriminals to continue developing ransomware or commit other crimes.

Your Desktop background will be changed to the following image:

Oops, todos os seus arquivos foram criptografados!!!
Seus documentos: fotos, vídeos, bancos de dados e outros arquivos importantes foram criptografados utilizando o algoritmo AES de 256 bits (mesma criptografia utilizada pelo governo americano para proteger segredos de estado), ou seja, é impossível recuperar seus arquivos sem a senha correta!
Caso haja interesse em obter essa senha e recuperar seus arquivos, recomendamos que entre em contato e siga as instruções!
Em 4 dias seus arquivos serão DELETADOS!
Leia o arquivo ‘RECUPERE_SEUS_ARQUIVOS.html’ que foi criado em sua área de trabalho.
Contato: [email protected]

A rough translation in English would look like the following:

Oops, all your files have been encrypted !!!
Your documents: photos, videos, databases and other important files were encrypted using the 256-bit AES algorithm (same encryption used by the US government to protect state secrets), ie it is impossible to recover your files without the correct password!
If you are interested in obtaining this password and recovering your files, we recommend that you contact us and follow the instructions!
In 4 days your files will be DELETED!
Read the file ‘RECUPERE_SEUS_ARQUIVOS.html’ that was created on your desktop.
Contact: [email protected]

As seen above, the Desktop background contains parts of the whole ransom note message.

DilmaLocker Ransomware – Encryption

The encryption process of the DilmaLocker ransomware is utilized with the help of the AES encryption algorithm with 256 ciphers or at least that is stated inside the ransom notes. The DilmaLocker virus will encrypt your files while placing the .__dilmaV1 extension to all locked files.

The targeted extensions of files which are sought to get encrypted are currently unknown and if a list is discovered, it will be posted here as the article gets updated. The files used most by users and which are probably encrypted are from the following categories:

  • Document files
  • Audio files
  • Video files
  • Image files
  • Backup files
  • Banking credentials and data

The DilmaLocker cryptovirus could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

The above-stated command could be executed and that would make the encryption process more efficient. That is due to the fact that the command is set to eliminate one of the prominent ways to restore your files. If your computer device was infected with this ransomware and your files are locked, keep reading to find out how you could potentially recover your data.

Remove DilmaLocker Ransomware and Restore .__dilmaV1 Files

If your computer got infected with the DilmaLocker ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by DilmaLocker and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as DilmaLocker.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove DilmaLocker follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove DilmaLocker files and objects
2. Find files created by DilmaLocker on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by DilmaLocker

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...