.Wallet File Virus - Restore Files (Update February 2018)

.Wallet File Virus (Restore Files)

If .Wallet File Virus (Dharma Ransomware) has infected your PC this article aims to help you remove the Dharma virus and try to restore your encrypted files with added .wallet file extension.

Amagnus@india.com is one of the e-mails the victims of the latest version of the Dharma ransomware (also known as the .Wallet virus), see after their computers have been infected by the malware. This type of ransomware infection aims to encrypt data via the AES algorithm on the computers it infects with the one and only purpose to extort the victim for a ransom payoff in BitCoin. In case you’ve become a victim of the Dharma virus it is advisable to read this material to help you remove the malware safely and try to restore the files encrypted by it.

Threat Summary


.Wallet File exe

Short Description.Wallet virus, also calling itself Dharma encrypts user files and leaves as contact e-mail addresses to contact the criminals behind it and pay the ransom fee.
SymptomsChanges file extension of encrypted files to .wallet. Changes wallpaper to one with ransom instructions that have ransom e-mail.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by .Wallet File exe


Malware Removal Tool

User ExperienceJoin our forum to Discuss .Wallet File exe.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

If you have been infected by the .wallet file virus, chances are you still haven’t succeeded in the file restoration process. This is because no official decrypter has been released for this version of Dharma ransomware yet, but the good news is a .wallet file decrypter may be available soon. Security researchers were able to code and release a decrypter for .dharma encrypted files. Both .dharma and .wallet file viruses ar part of the same ransomware family.

The Dharma ransomware uncovered to be part of the CrySis ransomware family, .wallet file virus inclusive, has proven to be a real menace to international users. The .wallet file virus has taken thousands of files hostage, leaving victims with no other option but to pray for a miracle (such as a free decrypter) or to pay the demanded ransom. A third option is also available – using an alternative data recovery program which may be able to restore at least some of your encrypted files. For more information, scroll down to the end of the article where you can find further instructions on using such a program.

While security researchers are still working on a .wallet file decrypter we kindly remind you to improve your data hygiene and to continuously back up all of your important data so that ransomware infections won’t have any impact on you.

Update May 2017 – New Data Recovery Method

Update May 2017. Our research indicates that this .wallet file virus continues to infect users in May 2017. In addition, there is a new ransomware infection, which uses the .wallet file extension. This new .Wallet infection encrypts the files by using the AES and RSA encryption algorithm. The ransom note is named #_Restoring_files_#.txt.

It has been brought to our attention that victims of the latest Dharma .wallet ransomware infection variants have managed to restore a very high percentage (over 90%) of their files using a very unique method – converting files into virtual drives and then using partition recovery option on data recovery programs. This method takes advantage of the converting the files into a .VHD file type which is a virtual drive. Since there are new data recovery programs specifically designed to recover partitions, one approach is to restore files encyrpted by Dharma ransomware is to convert the encrypted files into .VHD files and then try to recover them using partition recovery software. Since the algorithm that encrypts files actually alters only a small portion of the file, you have a much higher chance of recovering the files if you change them into .VHD type.

The methods have been reported to not be a full guarantee to recover all the files, but if you haven’t reinstalled your operating system yet, we advise you to follow them. But first, make sure to remove Dharma’s malicious files from the instructions at the bottom of these article. Here are the instructions:

.Wallet Recovery Instructions 2017

Step 1: Make sure to make copies of the .wallet encrypted files on another drive or PC:

Step 2: After creating the copies, download a tool that converts files in .VHD format. One good tool is Microsoft’s VHD conversion software. You can download it, by clicking on the button below:



Step 3: Now, make sure to rename a file that you want to recover in the .VHD file extension. For example, if the file is test.wallet, it should be test.vhd

Step 4: Now you need to run the VHDTOOL you previously downloaded from Windows Command Prompt. To do this, run Windows Command Prompt as an administrator by typing “cmd” in Windows Search and right-clicking after which choosing “Run as administrator”.

Then type the following commands exactly as it they are:

→ cd {The location of the file, for example C:\Users\Lenovo\Desktop}
vhdtool.exe /convert “{the location of your file and the name goes here}

The final result should look like the following image:

Step 5: After you convert the drive into VHD, make sure to mount it on your computer. To do this:

Right-click on My Computer or This PC and then click on “Manage”

Then right-click on Disk Management after which click on Attach VHD

Then click on the Browse button in order to locate and open the .vhd file

After this, to initialize the disk, right-click on it and click New Simple Volume. After this click on Next and set it up:

At the end, the volume should appear like the following:

Step 6: Download and recover the .VHD image using data recovery software. The data recovery software you should download has to support the option “Partition Recovery”. Here is a comprehensive list of multiple data recovery programs that are able to recover partitions:

Another scenario with which we have reports of over 90% of recovered files includes the usage of a program for Virtual Drive Recovery, since .VHD is essentially a virtual drive. Such programs are created with the sole purpose of recovering .VHD files. One of those programs is called BitRecover Virtual Drive Recovery Wizard.

How Dharma .Wallet File Infects

To encrypt the files on compromised computer by infecting it, the criminals behind the .Wallet file virus may undertake different approaches, varying from messages with links or attachments by suspicious users who send you friend requests on Skype, to suspicious e-mails sent to you, that resemble a bank or a legitimate service, like PayPal, Amazon or E-bay, for example.

Such messages may contain malicious files or scripts embedded in URLs that are masked as legitimate documents or even buttons. Opening those will lead to a malicious script causing an infection of Dharma ransomware and the download of it’s malicious payload under different names.

The infection file may have different tools embedded to cause a successful infection, such as:

  • Obfuscators to hide the infection.
  • An exploit kit to connect to criminal servers undetected and cause an infection via a bug.
  • File joiners to combine malicious code with legitimate files.
  • New URL’s that haven’t been flagged yet to cause a successful infection.
  • Malicious scripts.
  • Spamming affiliates or spamming software to spread the infection file/URL.

.Wallet File Virus – More Information

About the Buddhist religion, the word Dharma means to act accordingly a natural order, but it may also mean a phenomenon of some sort. However, unlike the harmony Dharma preaches, there is nothing in harmony about it. In fact, it is the opposite, because this virus aims to wreak havoc on your computer, once you are infected.

The first task of Dharma ransomware after infecting your computer is to make several different objects in the Windows Registry. These so-called values might make the .Wallet ransomware to run on Windows startup and automatically begin to encrypt files. The main registry keys that are targeted are the Run and RunOnce keys in the Windows Registry.

Also, Dharma ransomware may change the wallpaper and drop a ransom note to make sure the victim of the virus knowns it’s presence on the computer. The ransom note of the virus may be the same like it’s older version:

→ “//hallo, our dear friend!
//looks like you have some troubles with your security.
//all your files are now encrypted.
//using third-party recovering software will corrupt your data.
//you have only one way to get them back safely – using our decryption tool.
//to get original decryption tool contact us with email. In subject like write your ID, which you can find in name of every crypted file, also attach to email 3 crypted files.
//it is in your interest to respond as soon as pissible to ensure the restoration of your files because we won’t keep your decryption keys at our servers more than 72 hours in interest of our security.
//P.S. only in case you don’t receive a response from the first email address within 24 hours, please use this alternative email address.

Regarding file encryption, Dharma ransomware may attack the most widely used type of files, for example the following file extensions:


Furthermore, this particular Dharma version also uses a very similar file format to encrypt the files. Besides using a strong AES algorithm to make the files no longer openable, it makes the files look similar to the image below:

After the encryption process is complete, bytes of the files’ code is altered, and they are no longer accessible.

Remove .Wallet Virus from Your Computer and Try to Restore Encrypted Files

Viruses similar to Dharma ransomware have previously proven to be more and more difficult to decrypt after their newer versions come out with patches to prevent malware researchers to decipher the files.

But despite that, trying to restore the files and removing Dharma is strongly recommended by experts. This is we advise you to perform the following steps in case you have become a victim of Dharma’s .wallet variant.

1. Backup your files, even though they are encrypted, because a decryptor may be released, which, if happens we will make sure to post an update on this web page.
2. Remove Dharma ransomware by following the specific instructions created below.
3. Trying to restore copies of the encrypted files by following the alternative methods suggested in step “2. Restore files encrypted by .Wallet Virus”.

Boyana Peeva

Boyana Peeva

Believes that the glass is rather half-full and that nothing is bigger than the little things. Enjoys writing, reading and sharing content – information is power.

More Posts


  1. AvatarDecrypt

    I might be able to help decrypt the .wallet if you would like to send over a sample I can analyze it. Send encrypted file and same one from a backup if possible to ransomsample@outlook.com and I will take a look.

  2. AvatarJohn Doe

    I might have a solution for .wallet

    1. Avatartricio

      care to share :P

      1. AvatarJohn Doe

        i bought the files to decrypt and they worked but i need someone to take these files and make a solution out of it

        1. Avatarnic

          hi mr jhon, i have also been attack by .wallet, can you help me?

      2. AvatarJohn Doe

        Email me and i will try and assist RTSGhost@outlook.com

    2. AvatarVencislav Krustev

      What type of solution? What software did you use?

  3. AvatarMartin Parry

    What a crock!! The file has to be 12mb at least – The new text document example shown is over 12MB – I’d suggest it was a VHD to start with. Don’t waste your time


Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share