Dharma Ransomware

Dharma Ransomware Description

The Dharma Ransomware is an encryption ransomware Trojan that is being used to extort computer users. There have been numerous computers around the world that have been infected by the Dharma Ransomware. The Dharma Ransomware seems to target only the directories inside the Users directory on Windows, with encrypted files receiving the suffix [bitcoin143@india.com].dharma added to the end of each file name. Variants of the Dharma Ransomware will sometimes not have a ransom note. The Dharma Ransomware does not stop the affected computer from working properly, but every time a file is added to the targeted directories, it will be encrypted unless the Dharma Ransomware infection is removed.

The Dharma Ransomware may Change It's Name

Some computer users have reported that the file being used to deliver the Dharma Ransomware also may be named 'skanda.exe,' although this depends on the variant being used in the attack. Once the Dharma Ransomware has encrypted a file, it will no longer be readable by the victim's applications until it is decrypted. Unfortunately, to decrypt the files that have been affected by the Dharma Ransomware, it is necessary to have the decryption key, which the people responsible for the Dharma Ransomware will hold until the victim pays a ransom. A different variant of the Dharma Ransomware is contained in a folder named 'opFirlma,' which contained the application 'plinck.exe.' It is highly likely that these are randomly generated. Some variants of the Dharma Ransomware will include a ransom note contained in a text file named 'README.txt,' which will deliver the following message:

At the moment, your system is not protected.
We can fix it and restore files.
To restore the system write to this address:

How the Dharma Ransomware Infection Works

PC security analysts suspect that the Dharma Ransomware is one of the many variants of the infamous Crysis Ransomware family, which was responsible for numerous attacks since Summer of 2016. The Dharma Ransomware and its variants seem to be distributed using corrupted email attachments that will often exploit vulnerabilities in macros on the victim's computer. It is possible that the Dharma Ransomware is still under development since some samples of the Dharma Ransomware appear to be incomplete, often not containing ransom notes or other basic functions of these attacks. The Dharma Ransomware infection is fairly typical of these encryption ransomware attacks. The Dharma Ransomware uses the AES-256 encryption to take over the victim's data, preventing computer users from accessing their files. The Dharma Ransomware attacks will target the following directories:

  • %UserProfile%\Desktop
  • %UserProfile%\Downloads
  • %UserProfile%\Documents
  • %UserProfile%\Pictures
  • %UserProfile%\Music
  • %UserProfile%\Videos

Dealing with the Dharma Ransomware

PC security analysts strongly advise computer users against paying the Dharma Ransomware ransom. It is very unlikely that the people responsible for the Dharma Ransomware will provide the means to decrypt the infected files, especially in the case of the Dharma Ransomware, where it is clearly still under development. In fact, it is equally likely that the people responsible for the Dharma Ransomware attack will simply ask the victim to pay more money or simply ignore the victim's requests.

As with most encryption ransomware Trojans, the best solution to the attack is to take steps to establish a good backup system. This way, computer users can recover from a Dharma Ransomware attack by restoring their files from the backup copy, with no need to pay the ransom. In fact, if having file backups becomes a regular, widespread practice, attacks like the Dharma Ransomware will likely cease to exist, since the people responsible for these threats will no longer have any way to force computer users into paying the ransom to regain access to their own files. Malware analysts also advise computer users to take care when handling emails, since the Dharma Ransomware may spread through corrupted email attachments.

Do You Suspect Your PC May Be Infected with Dharma Ransomware & Other Threats? Scan Your PC with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Dharma Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. Free Remover allows you to run a one-off scan and receive, subject to a 48-hour waiting period, one remediation and removal. Free Remover subject to promotional details and Special Promotion Terms. To understand our policies, please also review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

Security Doesn't Let You Download SpyHunter or Access the Internet?

Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.

Technical Information

File System Details

Dharma Ransomware creates the following file(s):
# File Name Size MD5 Detection Count
1 %APPDATA%Info.hta 13,635 44d93d15807455a527283c6fedf65762 556
2 %SystemDrive%\Users\balcao7\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\setup.exe 140,288 2d138fc8252563e50b8d6c6cfb7d6989 392
3 %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\Information.hta 13,637 d0f94ea59e72e62ea6e6f058a5bba1a7 301
4 %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\MRLK.exe 90,112 20a218209aeeb09a1c26a68794685a71 88
5 %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\Inf.hta 13,641 1bf867566ccfc201dcf9688a9a21d80b 46
6 %WINDIR%\System32\pld.exe 90,112 f583191dd74da9fde815e79f7a1c1fed 40
7 %APPDATA%11.exe 226,304 ec443b1bc3affdf0565719a7385ac6d7 37
8 %SystemDrive%\Users\batalhruser3\AppData\Roaming\Payload28.exe 353,039 36e72dea18a1b5a490190bb56c67c710 36
9 %SystemDrive%\Users\HRD\AppData\Roaming\setap211.exe 340,820 68df2ef104a88857b38c7d64b94f11c9 35
10 %WINDIR%\System32\setup1.exe 214,045 c4c74767ddd35728f381b6ae64de107b 34
11 %SystemDrive%\Users\state\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1stk.exe 339,381 c376698b83bd3f54b43e4caeb316ae38 24
12 %WINDIR%\System32\inter2811_bandugan_1.exe 332,800 703c42e5456731444cf68cc27fdfbe96 24
13 %SystemDrive%\Users\george\AppData\Roaming\setap1.exe 311,808 f6069500044e436e6c641d4c99e916dd 24
14 %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\payload_175ZZZ (1).exe 140,288 9982f1221273a0cafb421ebc200ebd43 23
15 %SystemDrive%\Users\amit\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe 224,308 674bfb3719ce1b9d30dd906c20251090 20
More files

Related Posts

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their PC with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your PC. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.