.stun Files Virus – WHAT IS IT and How to Remove It
THREAT REMOVAL

.stun Files Virus – WHAT IS IT and How to Remove It

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

What are .stun files? What is the virus, using .stun file extension? How to remove .stun files ransomware? How to try and restore .stun encrypted files?

The .stun files virus is a ransomware that is part of the Dharma family of malware. The virus aims to encrypt the files on the computers it has already infected and then add the .stun file extension to them. Dharma ransomware also leaves the [email protected] alongside the .stun extension on the encrypted files so that victims can contact them. The aim of Dharma ransomware is to induce fear that you may never see your files again, until you pay ransom to retrieve them. If your files have the .stun ransomware and your computer is infected by Dharma ransomware, you should read the following article.

Threat Summary

Name.stun Dharma Virus
TypeRansomware, Cryptovirus
Short DescriptionAims to encrypt files on your computer and then extort you into paying ransom to get them to work again.
SymptomsFiles have the .stun extension and cannot be opened.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .stun Dharma Virus

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .stun Dharma Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.stun Files Virus – How Did I Get It and What Does It Do?

The .stun ransomware may enter your computer as a result of you opening its virus file. Such infection fles may be spread either via e-mail as an attachment or by being uploaded on a website, pretending to be a legitimate software download. They often mimick invoices, receipts, documents from a bank, reports, job-related documents, setups for programs, portable software, cracks, patches and many other file types. The goal is to trick you as a potential victim to download and run the files.

Once the .stun variant of Dharma ransomware infects your computer, it may immediately drop the virus files in different Windows directories and under different file names. The most targeted directories often turn out to be:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Temp%
  • %Roaming%

After the virus files of the .stun Dharma ransomware variant are already dropped, the virus may obtain administrator rights on the computer it has infected, only to begin encrypting files. The files that may be encrypted by this variant of Dharma ransomware could be of the following file types:

  • Videos.
  • Images.
  • Audio files.
  • Documents.
  • Archives.

Once Dharma .stun ransomware encrypts your files, they start to appear like the following:

After this variant of Dharma ransomware has finished with its encryption, the ransomware may show the convention ransom note used by it:

To eliminate any chances of you recovering your files via Windows backup and recovery services, Dharma .stun ransomware may execute the following Windows commands that may delete the shadow copies and disable and stop Windows recovery services:

→ sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

Remove Dharma Ransomware and Restore .stun Encrypted Files

Be advised that removing Dharma ransomware may take some skill and time. You can follow the removal steps 1 and 2 below and manually search for and remove the virus files of Dharma ransomware. However, with manual removal you risk damaging your files, because Dharma .stun ransomware may have mechanisms that trigger fail-safe scripts. This is why according to security experts, the best course of action towards removing Dharma ransomware is to skip step 1 and 2 and proceed to remove the virus automatically by downloading an advanced anti-malware program. This tool will not only save you a lot of time compared to manual removal, but it will also effectively and safely delete Dharma .stun ransomware from your computer plus protect it against future infections too.

When it comes to your files, be advised that at this point, files, encrypted with the .stun extension added cannot be decrypted for free. But this does not mean that paying the ransom will solve your problem – it is NOT recommended. Instead, we advise you to backup the .stun files on your computer and wait for a free decryptor to be released by malware analysts. When it has been, we will update this article with a download link. In the meantime, you can try to recover your files by the alternative methods we have posted underneath. They may not be with a 100% recovery success rate, but they might be able to help you get at least some of your files back.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

2 Comments

  1. Dk

    Hi
    My PC infected with .stun
    Wanted to decrupt is that possible.

    Regards
    Dk

    Reply
  2. Antonius MS

    Hello, My PC infected with .stun
    any one can help??

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...