Yet another virus from the XTBL ransomware variants has popped out into the open. Similar to other XTBL variants this virus also encrypts the files of the infected computer making them no longer openable. A ransom note is left after the encryption process is completed which is typical for this type of virus. The payment e-mail is DIGITALKEY2@163.com and the virus may use an AES encryption algorithm that is combined with an RSA cipher. Not only this but DIGITALKEY2 ransomware also uses different file extension that includes the unique identification number, the e-mail and the identical .xtbl file extension which is added after the e-mail address. Users who have been affected by this virus are strongly advised not to perform any type of negotiations with the cyber-criminals and any payments to them.
Sensors Tech Forum team is currently investigating this threat. The article will be updated as soon as more information for DIGITALKEY2 ransomware is discovered.
|Short Description||Possible variant of the .XTBL ransomware viruses. Encrypts files with a strong encryption and drops a ransom note with payoff for decryption instructions.|
|Symptoms||After encryption the ransomware may steal information and appends .xtbl extension after every file.|
|Distribution Method||Spam Emails, Email Attachments, File Sharing Networks.|
|Detection Tool|| See If Your System Has Been Affected by DIGITALKEY2 |
Malware Removal Tool
|User Experience||Join our forum to Discuss DIGITALKEY2 Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
DIGITALKEY2 Ransomware – How Does It Spread
For it to cause infections to users, the ransomware virus is believed to be redistributed via a combination of different tools:
- Process obfuscators.
- Malicious droppers, loaders.
- Exploit kit.
- Malicious domains.
- File joiners.
- Spam bots.
To keep replicating, spamming bot software may be used to distribute the virus in different forms. The worst part is that since a variety of spam e-mail addresses are being used and a variety of hosts as well, the ransomware may be very difficult to be stopped before the infection if it is well obfuscated.
DIGITALKEY2 Ransomware – Technical Overview
Similar to other ransomware variants, belonging to the CrySiS family the virus may exhibit a behavior that involves dropping malicious files after the infection is complete. The dropped malicious files may be either in concealed folders such as:
The malicious files may also be located in the %Startup% folder which is most often the case, because this folder makes files, like the encryptor or the ransom note run on system startup.
However, if the target PC has protection enabled for this folder the DIGITALKEY2 ransomware may use the registry entries that allow for the automatic startup of a file no matter where it is located on the computer. The usual targeted keys for that are:
As soon as the encryption file of DIGITALKEY2 is ran, the virus immediately begins encrypting:
- Audio files.
- Microsoft Office Documents
- Other files associated with often ran programs.
The encrypted files have unique keys generated specifically for them and these keys are usually sent to the cyber-criminals. A file encrypted by DIGITALKEY2 ransomware looks like the following:
DIGITALKEY2 Ransomware Remove It and Restore Your Files
In order to remove this virus completely from your computer, we strongly suggest using the removal instructions after this article. They will assist with the proper deletion of the virus from your computer. Not only this, but the DIGITALKEY2 ransomware is also believed to be exhibiting behavior that may make manual removal a risky process. This is why we advise you, in case you do not have the necessary experience to remove the virus automatically via an advanced anti-malware software which will safely eradicate it’s files.
To successfully attempt and restore files that are associated with DIGITALKEY2 ransomware, bear in mind that you should focus on attempting the Shade Decryptor which is designed for the Shade/XTBL extension using ransomware variants, link for which we have provided below:
In case this decryption method does not succeed we advise you to backup your files and begin using other alternative methods, like the ones in step “2. Restore Files Encrypted by DIGITALKEY2 Ransomware” below.