Dharma stands for a large family of ransomware threats that has been attacking PCs since 2016. This is a ransomware encrypting the personal data stored on the victim’s PC.
Once the encryption is successfully implemented, the ransomware shows a message which demands a payment in Bitcoin for restoring the data.
Typical evidences of the attack:
Owners of infected devices will find a scary warning on their screens once the encryption process has been already performed. They may also be surprised to find out that all the available restore points are no longer available and that their documents are inaccessible because of encryption that added a new extension into each modified file.
Stages of cryptoware infection:
As soon as Dharma infects the system, it makes its appropriate registry entries to maintain its presence and encrypts literally every file type, without modifying important system and malware files. It initiates the encryption mechanism by means of a complex encryption algorithm (AES-256 in conjunction with RSA-1024 asymmetric encryption), which is often used for fixed, removable, and network drives.
Preliminary to the encryption process, Dharma removes all the Windows Restore Points by executing the following command:
vssadmin delete shadows /all /quiet
The Trojan that injects the ransomware obtains the computer’s name and a range of encrypted files according to the specific formats, transferring them to a remote C&C server owned by the threat developer. In some cases with specific Windows versions, it also manages to run itself with administrator privileges, thus broadening the list of files that are subject for encryption.
Upon completion of the successful RDP-based attack, many people report that before actually displaying the scary alerts demanding the random to be paid, CrySIS additionally removes all available security software installed on the attacked device.
Dharma ransomware mostly comes via RDP, so please disable it or change the default port for RDP!
Dharma is identified by anti-virus programs as Ransom.Crysis or Ransom.Dharma. It attacks Windows systems. It mainly attacks businesses. It refers to the help of several channels for promotion:
- Dharma can also present itself as installation files for reputable programs, including the anti-virus software. Dharma distributors will disguise these harmless looking installers for various legitimate programs as downloadable executables, which they have been promoting via numerous online resources and shared networks.
- In many cases, Dharma is spread manually during the targeted attacks by means of the leaked or weak RDP credentials. This implies that a human attacker is getting access to the victim’s computer prior to injecting the malware by misusing the Windows RDP protocol on port 3389.
- Based on the analysis of the latest attack, Dharma was installed as a download link via a spam email. The link directed to a password-protected, self-extracting bundle installer. The password was specified for the potential victims in the email and, in addition to the Dharma executable, the installer contained an outdated removal utility elaborated by a well-known security developer.
- This social engineering approach aimes to bypass existing security barriers. Encountering a well-known security solution in the installation package misled people and made them think that the downloadable file was secure, and this is the way the attack got successfully accomplished.
The following Dharma note names have been found:
- HOW TO DECRYPT YOUR DATA.txt
- Readme to restore your files.txt
- Decryption instructions.txt
- FILES ENCRYPTED.txt
- Files encrypted!!.txt
Dharma typically appends the following extensions for all the files it encrypts:
.vbox, .crysis, .dharma, wallet, .java, .adobe, .viper1, .write, .bip, .zzzzz, .viper2, .arrow, .gif, .xtbl, .onion, .bip, .cezar, .combo, .cesar, .cmb, .AUF, .arena, .brrr, .btc, .cobra, .gamma, .heets, .java, .monro, .USA, .bkp, .xwx, .btc, .best, .bgtx, .boost, .heets, .waifu, .qwe, .gamma, .ETH, .bet, ta, .air, .vanss, . 888, .FUNNY, .amber, .gdb, .frend, .like, .KARLS, .xxxxx, .aqva, .lock, .korea, .plomb, .tron, .NWA, .AUDIT, .com, .cccmn, .azero, .Bear, .bk666, .fire, .stun, .myjob, .ms13, .war, .carcn, .risk, .btix, .bkpx, .he, .ets, .santa, .gate, .bizer, .LOVE, .LDPR, .MERS, .bat, .qbix, .aa1, and .wal
How to decrypt DHARMA files?
You can download and use this decrypter that Kaspersky released if you were hit by .dharma extension.
The list of Dharma (CrySiS) Ransomware.
- [email@example.com].angus Virus Files. How to Fix?
- firstname.lastname@example.org Virus Removal + Decrypt .kharma Files
- Restore [email@example.com].deuce Files
- Syss Virus File (Dharma) – How to Remove It
- Restore [firstname.lastname@example.org].ninja Files
- .kr Virus File (Dharma Ransomware) – Remove It
- email@example.com Virus Removal + Decrypt .nvram Files
- firstname.lastname@example.org Virus Removal + Decrypt .rsa Files
- Restore [email@example.com].virus Files
- Restore [firstname.lastname@example.org].harma Files
- .start Virus File (Dharma Ransomware) – Remove It
- .asus Virus File (Dharma Ransomware) – Remove It
- .xda Virus File (Dharma Ransomware) – Remove It
- One Virus File (Dharma) – How to Remove It
- [email@example.com].wiki Virus Files. How to Fix?
- firstname.lastname@example.org Virus Removal + Decrypt .bot Files
- .uta Virus File (Dharma Ransomware) – Remove It
- [email@example.com].oo7 Virus Files. How to Fix?
- [firstname.lastname@example.org].krab Virus Files. How to Fix?
- .money Virus File (Dharma Ransomware) – Remove It
- [email@example.com].cash Virus Files. How to Fix?
- firstname.lastname@example.org Virus Removal + Decrypt .adame Files
- Restore [email@example.com].calix Files
- firstname.lastname@example.org Virus Removal + Decrypt .vival Files
- Restore [email@example.com].vbox Files
User Review( vote)