Remove DIGITALKEY2 Ransomware and Decrypt .Xtbl Files - How to, Technology and PC Security Forum |

Remove DIGITALKEY2 Ransomware and Decrypt .Xtbl Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

ransomware-on-focus-sensorstechforumYet another virus from the XTBL ransomware variants has popped out into the open. Similar to other XTBL variants this virus also encrypts the files of the infected computer making them no longer openable. A ransom note is left after the encryption process is completed which is typical for this type of virus. The payment e-mail is and the virus may use an AES encryption algorithm that is combined with an RSA cipher. Not only this but DIGITALKEY2 ransomware also uses different file extension that includes the unique identification number, the e-mail and the identical .xtbl file extension which is added after the e-mail address. Users who have been affected by this virus are strongly advised not to perform any type of negotiations with the cyber-criminals and any payments to them.

Sensors Tech Forum team is currently investigating this threat. The article will be updated as soon as more information for DIGITALKEY2 ransomware is discovered.

Threat Summary

Short DescriptionPossible variant of the .XTBL ransomware viruses. Encrypts files with a strong encryption and drops a ransom note with payoff for decryption instructions.
SymptomsAfter encryption the ransomware may steal information and appends .xtbl extension after every file.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by DIGITALKEY2


Malware Removal Tool

User ExperienceJoin our forum to Discuss DIGITALKEY2 Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

DIGITALKEY2 Ransomware – How Does It Spread

For it to cause infections to users, the ransomware virus is believed to be redistributed via a combination of different tools:

  • Process obfuscators.
  • Malicious droppers, loaders.
  • Exploit kit.
  • JavaScript droppers.
  • Malicious domains.
  • File joiners.
  • Spam bots.

To keep replicating, spamming bot software may be used to distribute the virus in different forms. The worst part is that since a variety of spam e-mail addresses are being used and a variety of hosts as well, the ransomware may be very difficult to be stopped before the infection if it is well obfuscated.

DIGITALKEY2 Ransomware – Technical Overview

Similar to other ransomware variants, belonging to the CrySiS family the virus may exhibit a behavior that involves dropping malicious files after the infection is complete. The dropped malicious files may be either in concealed folders such as:

  • %AppData%
  • %Roaming%
  • %Local%
  • %SystemDrive%
  • %UserProfile%

The malicious files may also be located in the %Startup% folder which is most often the case, because this folder makes files, like the encryptor or the ransom note run on system startup.

However, if the target PC has protection enabled for this folder the DIGITALKEY2 ransomware may use the registry entries that allow for the automatic startup of a file no matter where it is located on the computer. The usual targeted keys for that are:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

As soon as the encryption file of DIGITALKEY2 is ran, the virus immediately begins encrypting:

  • Videos.
  • Pictures.
  • Audio files.
  • Microsoft Office Documents
  • Other files associated with often ran programs.

The encrypted files have unique keys generated specifically for them and these keys are usually sent to the cyber-criminals. A file encrypted by DIGITALKEY2 ransomware looks like the following:

New Text Document.txt.{UNIQUEID}

DIGITALKEY2 Ransomware Remove It and Restore Your Files

In order to remove this virus completely from your computer, we strongly suggest using the removal instructions after this article. They will assist with the proper deletion of the virus from your computer. Not only this, but the DIGITALKEY2 ransomware is also believed to be exhibiting behavior that may make manual removal a risky process. This is why we advise you, in case you do not have the necessary experience to remove the virus automatically via an advanced anti-malware software which will safely eradicate it’s files.

To successfully attempt and restore files that are associated with DIGITALKEY2 ransomware, bear in mind that you should focus on attempting the Shade Decryptor which is designed for the Shade/XTBL extension using ransomware variants, link for which we have provided below:

Decrypt Files Encrypted by Shade/XTBL Ransomware

In case this decryption method does not succeed we advise you to backup your files and begin using other alternative methods, like the ones in step “2. Restore Files Encrypted by DIGITALKEY2 Ransomware” below.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share