Yet another virus from the XTBL ransomware variants has popped out into the open. Similar to other XTBL variants this virus also encrypts the files of the infected computer making them no longer openable. A ransom note is left after the encryption process is completed which is typical for this type of virus. The payment e-mail is DIGITALKEY2@163.com and the virus may use an AES encryption algorithm that is combined with an RSA cipher. Not only this but DIGITALKEY2 ransomware also uses different file extension that includes the unique identification number, the e-mail and the identical .xtbl file extension which is added after the e-mail address. Users who have been affected by this virus are strongly advised not to perform any type of negotiations with the cyber-criminals and any payments to them.
Sensors Tech Forum team is currently investigating this threat. The article will be updated as soon as more information for DIGITALKEY2 ransomware is discovered.
|Short Description||Possible variant of the .XTBL ransomware viruses. Encrypts files with a strong encryption and drops a ransom note with payoff for decryption instructions.|
|Symptoms||After encryption the ransomware may steal information and appends .xtbl extension after every file.|
|Distribution Method||Spam Emails, Email Attachments, File Sharing Networks.|
|Detection Tool|| See If Your System Has Been Affected by DIGITALKEY2 |
Malware Removal Tool
|User Experience||Join our forum to Discuss DIGITALKEY2 Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
DIGITALKEY2 Ransomware – How Does It Spread
For it to cause infections to users, the ransomware virus is believed to be redistributed via a combination of different tools:
- Process obfuscators.
- Malicious droppers, loaders.
- Exploit kit.
- Malicious domains.
- File joiners.
- Spam bots.
To keep replicating, spamming bot software may be used to distribute the virus in different forms. The worst part is that since a variety of spam e-mail addresses are being used and a variety of hosts as well, the ransomware may be very difficult to be stopped before the infection if it is well obfuscated.
DIGITALKEY2 Ransomware – Technical Overview
Similar to other ransomware variants, belonging to the CrySiS family the virus may exhibit a behavior that involves dropping malicious files after the infection is complete. The dropped malicious files may be either in concealed folders such as:
The malicious files may also be located in the %Startup% folder which is most often the case, because this folder makes files, like the encryptor or the ransom note run on system startup.
However, if the target PC has protection enabled for this folder the DIGITALKEY2 ransomware may use the registry entries that allow for the automatic startup of a file no matter where it is located on the computer. The usual targeted keys for that are:
As soon as the encryption file of DIGITALKEY2 is ran, the virus immediately begins encrypting:
- Audio files.
- Microsoft Office Documents
- Other files associated with often ran programs.
The encrypted files have unique keys generated specifically for them and these keys are usually sent to the cyber-criminals. A file encrypted by DIGITALKEY2 ransomware looks like the following:
DIGITALKEY2 Ransomware Remove It and Restore Your Files
In order to remove this virus completely from your computer, we strongly suggest using the removal instructions after this article. They will assist with the proper deletion of the virus from your computer. Not only this, but the DIGITALKEY2 ransomware is also believed to be exhibiting behavior that may make manual removal a risky process. This is why we advise you, in case you do not have the necessary experience to remove the virus automatically via an advanced anti-malware software which will safely eradicate it’s files.
To successfully attempt and restore files that are associated with DIGITALKEY2 ransomware, bear in mind that you should focus on attempting the Shade Decryptor which is designed for the Shade/XTBL extension using ransomware variants, link for which we have provided below:
In case this decryption method does not succeed we advise you to backup your files and begin using other alternative methods, like the ones in step “2. Restore Files Encrypted by DIGITALKEY2 Ransomware” below.
- Guide 1: How to Remove DIGITALKEY2 from Windows.
- Guide 2: Get rid of DIGITALKEY2 from Mac OS X.
- Guide 3: Remove DIGITALKEY2 from Google Chrome.
- Guide 4: Erase DIGITALKEY2 from Mozilla Firefox.
- Guide 5: Uninstall DIGITALKEY2 from Microsoft Edge.
- Guide 6: Remove DIGITALKEY2 from Safari.
- Guide 7: Eliminate DIGITALKEY2 from Internet Explorer.
How to Remove DIGITALKEY2 from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove DIGITALKEY2
Step 2: Uninstall DIGITALKEY2 and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it.
Step 3: Clean any registries, created by DIGITALKEY2 on your computer.
The usually targeted registries of Windows machines are the following:
You can access them by opening the Windows registry editor and deleting any values, created by DIGITALKEY2 there. This can happen by following the steps underneath:
Get rid of DIGITALKEY2 from Mac OS X.
Step 1: Uninstall DIGITALKEY2 and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove DIGITALKEY2 via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove DIGITALKEY2 files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as DIGITALKEY2, the recommended way of eliminating the threat is by using an anti-malware program. Combo Cleaner offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Remove DIGITALKEY2 from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Erase DIGITALKEY2 from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Uninstall DIGITALKEY2 from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Remove DIGITALKEY2 from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the DIGITALKEY2 will be removed.
Eliminate DIGITALKEY2 from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.