Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Remove DIGITALKEY2 Ransomware and Decrypt .Xtbl Files

ransomware-on-focus-sensorstechforumYet another virus from the XTBL ransomware variants has popped out into the open. Similar to other XTBL variants this virus also encrypts the files of the infected computer making them no longer openable. A ransom note is left after the encryption process is completed which is typical for this type of virus. The payment e-mail is [email protected] and the virus may use an AES encryption algorithm that is combined with an RSA cipher. Not only this but DIGITALKEY2 ransomware also uses different file extension that includes the unique identification number, the e-mail and the identical .xtbl file extension which is added after the e-mail address. Users who have been affected by this virus are strongly advised not to perform any type of negotiations with the cyber-criminals and any payments to them.

Sensors Tech Forum team is currently investigating this threat. The article will be updated as soon as more information for DIGITALKEY2 ransomware is discovered.

Threat Summary

NameDIGITALKEY2
TypeRansomware
Short DescriptionPossible variant of the .XTBL ransomware viruses. Encrypts files with a strong encryption and drops a ransom note with payoff for decryption instructions.
SymptomsAfter encryption the ransomware may steal information and appends .xtbl extension after every file.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by DIGITALKEY2

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss DIGITALKEY2 Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

DIGITALKEY2 Ransomware – How Does It Spread

For it to cause infections to users, the ransomware virus is believed to be redistributed via a combination of different tools:

  • Process obfuscators.
  • Malicious droppers, loaders.
  • Exploit kit.
  • JavaScript droppers.
  • Malicious domains.
  • File joiners.
  • Spam bots.

To keep replicating, spamming bot software may be used to distribute the virus in different forms. The worst part is that since a variety of spam e-mail addresses are being used and a variety of hosts as well, the ransomware may be very difficult to be stopped before the infection if it is well obfuscated.

DIGITALKEY2 Ransomware – Technical Overview

Similar to other ransomware variants, belonging to the CrySiS family the virus may exhibit a behavior that involves dropping malicious files after the infection is complete. The dropped malicious files may be either in concealed folders such as:

  • %AppData%
  • %Roaming%
  • %Local%
  • %SystemDrive%
  • %UserProfile%

The malicious files may also be located in the %Startup% folder which is most often the case, because this folder makes files, like the encryptor or the ransom note run on system startup.

However, if the target PC has protection enabled for this folder the DIGITALKEY2 ransomware may use the registry entries that allow for the automatic startup of a file no matter where it is located on the computer. The usual targeted keys for that are:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

As soon as the encryption file of DIGITALKEY2 is ran, the virus immediately begins encrypting:

  • Videos.
  • Pictures.
  • Audio files.
  • Microsoft Office Documents
  • Other files associated with often ran programs.

The encrypted files have unique keys generated specifically for them and these keys are usually sent to the cyber-criminals. A file encrypted by DIGITALKEY2 ransomware looks like the following:

New Text [email protected]

DIGITALKEY2 Ransomware Remove It and Restore Your Files

In order to remove this virus completely from your computer, we strongly suggest using the removal instructions after this article. They will assist with the proper deletion of the virus from your computer. Not only this, but the DIGITALKEY2 ransomware is also believed to be exhibiting behavior that may make manual removal a risky process. This is why we advise you, in case you do not have the necessary experience to remove the virus automatically via an advanced anti-malware software which will safely eradicate it’s files.

To successfully attempt and restore files that are associated with DIGITALKEY2 ransomware, bear in mind that you should focus on attempting the Shade Decryptor which is designed for the Shade/XTBL extension using ransomware variants, link for which we have provided below:

Decrypt Files Encrypted by Shade/XTBL Ransomware

In case this decryption method does not succeed we advise you to backup your files and begin using other alternative methods, like the ones in step “2. Restore Files Encrypted by DIGITALKEY2 Ransomware” below.

Manually delete DIGITALKEY2 from your computer

Note! Substantial notification about the DIGITALKEY2 threat: Manual removal of DIGITALKEY2 requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove DIGITALKEY2 files and objects
2.Find malicious files created by DIGITALKEY2 on your PC
3.Fix registry entries created by DIGITALKEY2 on your PC

Automatically remove DIGITALKEY2 by downloading an advanced anti-malware program

1. Remove DIGITALKEY2 with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by DIGITALKEY2 in the future
3. Restore files encrypted by DIGITALKEY2
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.