Remove DIGITALKEY2 Ransomware and Decrypt .Xtbl Files - How to, Technology and PC Security Forum | SensorsTechForum.com
THREAT REMOVAL

Remove DIGITALKEY2 Ransomware and Decrypt .Xtbl Files

OFFER

SCAN YOUR MAC
with Combo Cleaner

Scan Your System for Malicious Files
Note! Your system might be affected by DIGITALKEY2 and other threats
Threats such as DIGITALKEY2 may be persistent. They tend to re-appear if not fully deleted. A malware removal tool like Combo Cleaner will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
Combo Cleaner’s scanner is free but the paid version is needed to remove the malware threats. Read Combo Cleaner’s EULA and Privacy Policy.

ransomware-on-focus-sensorstechforumYet another virus from the XTBL ransomware variants has popped out into the open. Similar to other XTBL variants this virus also encrypts the files of the infected computer making them no longer openable. A ransom note is left after the encryption process is completed which is typical for this type of virus. The payment e-mail is [email protected] and the virus may use an AES encryption algorithm that is combined with an RSA cipher. Not only this but DIGITALKEY2 ransomware also uses different file extension that includes the unique identification number, the e-mail and the identical .xtbl file extension which is added after the e-mail address. Users who have been affected by this virus are strongly advised not to perform any type of negotiations with the cyber-criminals and any payments to them.

Sensors Tech Forum team is currently investigating this threat. The article will be updated as soon as more information for DIGITALKEY2 ransomware is discovered.

Threat Summary

NameDIGITALKEY2
TypeRansomware
Short DescriptionPossible variant of the .XTBL ransomware viruses. Encrypts files with a strong encryption and drops a ransom note with payoff for decryption instructions.
SymptomsAfter encryption the ransomware may steal information and appends .xtbl extension after every file.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by DIGITALKEY2

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss DIGITALKEY2 Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

DIGITALKEY2 Ransomware – How Does It Spread

For it to cause infections to users, the ransomware virus is believed to be redistributed via a combination of different tools:

  • Process obfuscators.
  • Malicious droppers, loaders.
  • Exploit kit.
  • JavaScript droppers.
  • Malicious domains.
  • File joiners.
  • Spam bots.

To keep replicating, spamming bot software may be used to distribute the virus in different forms. The worst part is that since a variety of spam e-mail addresses are being used and a variety of hosts as well, the ransomware may be very difficult to be stopped before the infection if it is well obfuscated.

DIGITALKEY2 Ransomware – Technical Overview

Similar to other ransomware variants, belonging to the CrySiS family the virus may exhibit a behavior that involves dropping malicious files after the infection is complete. The dropped malicious files may be either in concealed folders such as:

  • %AppData%
  • %Roaming%
  • %Local%
  • %SystemDrive%
  • %UserProfile%

The malicious files may also be located in the %Startup% folder which is most often the case, because this folder makes files, like the encryptor or the ransom note run on system startup.

However, if the target PC has protection enabled for this folder the DIGITALKEY2 ransomware may use the registry entries that allow for the automatic startup of a file no matter where it is located on the computer. The usual targeted keys for that are:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

As soon as the encryption file of DIGITALKEY2 is ran, the virus immediately begins encrypting:

  • Videos.
  • Pictures.
  • Audio files.
  • Microsoft Office Documents
  • Other files associated with often ran programs.

The encrypted files have unique keys generated specifically for them and these keys are usually sent to the cyber-criminals. A file encrypted by DIGITALKEY2 ransomware looks like the following:

New Text Document.txt.{UNIQUEID}[email protected]

DIGITALKEY2 Ransomware Remove It and Restore Your Files

In order to remove this virus completely from your computer, we strongly suggest using the removal instructions after this article. They will assist with the proper deletion of the virus from your computer. Not only this, but the DIGITALKEY2 ransomware is also believed to be exhibiting behavior that may make manual removal a risky process. This is why we advise you, in case you do not have the necessary experience to remove the virus automatically via an advanced anti-malware software which will safely eradicate it’s files.

To successfully attempt and restore files that are associated with DIGITALKEY2 ransomware, bear in mind that you should focus on attempting the Shade Decryptor which is designed for the Shade/XTBL extension using ransomware variants, link for which we have provided below:

Decrypt Files Encrypted by Shade/XTBL Ransomware

In case this decryption method does not succeed we advise you to backup your files and begin using other alternative methods, like the ones in step “2. Restore Files Encrypted by DIGITALKEY2 Ransomware” below.

Note! Your computer system may be affected by DIGITALKEY2 and other threats.
Scan Your MAC with Combo Cleaner
Combo Cleaner is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as DIGITALKEY2.
Keep in mind, that Combo Cleaner needs to purchased to remove the malware threats. Click on the corresponding links to check Combo Cleaner’s EULA and Privacy Policy.

Manually delete DIGITALKEY2 from your Mac

1. Uninstall DIGITALKEY2 and remove related files and objects
2. Remove DIGITALKEY2 – related extensions from your Mac’s browsers

Automatically remove DIGITALKEY2 from your Mac

When you are facing problems on your Mac as a result of unwanted scripts and programs such as DIGITALKEY2, the recommended way of eliminating the threat is by using an anti-malware program. Combo Cleaner offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.


Download

Combo Cleaner

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...