Remove Drugvokrug727 Virus and Decrypt .xtbl Files - How to, Technology and PC Security Forum |

Remove Drugvokrug727 Virus and Decrypt .xtbl Files


A variant of the Troldesh/Shade ransomware virus family has been spotted recently. The virus has been dubbed Drugvokrug727 because it uses the [email protected] email address. The wallpaper placed on a compromised computer features a digital sketch of the main character from the movie “The Big Lebowski” – the Dude. The ransomware locks files with an extension ending in .xtbl . The ransom price is unspecified. To see how to remove this ransomware and how you might restore your files, you should read the article to its end.

UPDATE! Kaspersky malware researchers have released a Shade decryptor which can decode files encoded by the the Shade ransomware variants. Since this includes the .xtbl file extension, we have created instructions on how to decrypt your .xtbl files. The instructions can be found on the link below:
Decrypt Files Encrypted by Shade Ransowmare

Threat Summary

TypeRansomware, Crypto-Virus
Short DescriptionThe ransomware encrypts files with an extension ending in [email protected] and leaves an email address as a contact for the supposed decryption of the files.
SymptomsThe ransomware will run with each Windows start and encrypt files on your computer. Your wallpaper will be set to a picture with “The Dude” movie character and decrypt instructions pointing to an email address as a contact.
Distribution MethodSpam Emails, Email Attachments, Executable Files
Detection Tool See If Your System Has Been Affected by Drugvokrug727


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Drugvokrug727.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Drugvokrug727 Virus – Methods of Distribution

The Drugvokrug727 ransomware virus probably has more than one distribution method. Targeted attacks are surely one of the main methods, as well as spam email campaigns. A spam email will try to engage you into reading it and opening a file attached to that email. The attachment may seem harmless and of known file type, but in reality to be the payload source for the ransomware. Be extremely careful around emails that have attachments or download links in their body.

A possibility exists, where Drugvokrug727 virus can infect you through social media services or via file-sharing networks. Platforms and websites of that kind might distribute the malicious payload code with executables or batch files, disguised as necessary and useful software applications. An important advice you could follow to prevent ransomware viruses from infecting you is to avoid every email, file or link that seems suspicious and is of an unknown origin. Refrain from directly opening files in general – check their signatures, size and possibly scan them with a security program. You can find more tips about countering and preventing ransomware infections in the respective topic in our forum.

Drugvokrug727 Virus – A Closer Look

Drugvokrug727 is how a virus has been dubbed, belonging to the Shade/Troldesh ransomware family a.k.a. the XTBL ransomware. The name of this virus is derived from the email that its creator uses for contact – [email protected]. As other ransomware viruses of the same family, this one also puts that email in the extension of each encrypted file.

Here are more variants of this ransomware virus:

The ransomware will encrypt files found on your hard disk drives or other storage devices, but system files will not be touched. Before the encryption process begins, the ransomware goes through some predefined stages. After the ransomware finds an entry point to your computer and its payload file is executed, the malicious script found inside will initiate the following:

First, it will create five files, some of which are executables and some contain instructions:

%UserProfile%\How to decrypt your files.jpg

%System%\[THREAT FILE NAME].exe

%UserProfile%\Start Menu\Programs\Startup\[THREAT FILE NAME].exe

%UserProfile%\Start Menu\Programs\Startup\How to decrypt your files.jpg

%UserProfile%\Start Menu\Programs\Startup\How to decrypt your files.txt

Second, it will create this entry in the Windows Registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\”[RANDOM CHARACTERS]” = “%System%\[THREAT FILE NAME].exe”

That registry entry will keep the ransomware virus perseverant and launch it with every start of the Windows Operating System.

Third, it will then connect to a remote location, which may be one of the following:

Source: Symantec

Next, your files get encrypted, and after that process is complete, you will notice your desktop background to be swapped with some new wallpaper. That wallpaper contains instructions about how to contact the ransomware makers. Also, in the picture, there is a famous movie character portrayed – The Dude from the movie “The Big Lebowski”. That is how your desktop will look like if you got infected:


That picture on your desktop and a text file with instructions bear the name How to decrypt your files. The text on the image shown above reads:

Дектиптор файлов можно
получить на почте:
[email protected]

Decryptor files are available
at the post office:
[email protected]

The other file – How to decrypt your files.txt looks like this:


The Drugvokrug727 virus does not specify a payment price for the decryption of your files. Also, it does not urge you with a limited time period. The ransomware creator has left only a single email for contact, which the ransomware is named after by researchers.

Do NOT even try to contact the [email protected] email or any other alternative email address you could have been provided with from the virus. Even if you pay the ransom, you may not get your files back. See this comment posted in our blog by a user infected with ransomware of the same family. The user paid a fortune and didn’t get the courtesy of getting even a single file back.

So, paying criminals will technically make you their accomplice, as the money will be used to further their criminal activities. Also, because Drugvokrug727 is one of the many variants of the Shade/Troldesh ransomware family, there is a way you can try to restore your files. A decryptor tool manufactured by Kaspersky exists, and you can see it in the instructions below this article.

The Drugvokrug727 ransomware encrypts lots of different file types. The virus encrypts files which have these file extensions:

→.jpg, .jpg2, .png, .ppt, .pptm, .pptx, .bmp, .doc, .docm, .docx, .docxml, .pdf, .gif, .rtf, .tar, .targz, .targz2, .txt, .xlmv, .xls, .xlsm, .xlsx, .xml, .mkv, .mov , .mp4, .mpeg, .mpg, .msg, .myd, .myi, .obj, .odb, .odc, .odm, .ods, .oft,. one, .onepkg, .onetoc2, .opt, .oqy, .p7b, .p7c, .pcx, .pdd, .pdp, .pem, .pfx, .php, .php3, .php4, .php5, .phtml, .pl, .pm, .pot, .potm, .potx, .pps, .ppsn, .prn, .pst, .ptx, .pxr, .py, .ai3, .ai4, .ai5, .ai6, .arw, .as, .ASA, .ascx, .asmx, .asp, .aspx,. asr, .avi, .bak, .bay, .bz2, .c, .cdr, .cer, .cfc, .cfn, .cfnl, .cin, .chm, .class, .config, .cpp, .crt, .cs, .css, .csv, .cub, .dae, .db, .dc3, .dcm, .der, .dic, .dif, .divx, .djvu, .dl, .dot, .dotm , .dotx, .dpx, .dqy, .dtd, .dwg, .dx, .dxf, .dsn, .dwt, .eps, .exr, .fido,. frm, .gz, .h, .hpp, .hta, .htc, .htm, .html, .icb, .ics, .iff, .inc, .ind, .ini, .iqy, .j2c, .i2k, .java, .jp2, .jpc, .jpf, .jpx, .js, .jso, .json, .kmz, .lbi, .m4v, .mdb, .mdf, .mef , .mht, .mhtml, .r3d, .rar, .rdf, .rle , .rqy, .rss, .rw2, .rwl, .sct, .sdpx, .shtm, .shtml, .slk, .sln, .sql,. srw, .ssi, .stn, .svg, .svg2, .swf, .tdi, .tga, .tld, .u3d, .udl, .uxdc, .vcs, .vda, .wbm, .wbmp, .xlk, .xlm, .xltx, .xlw, .xsd, .xsl, .xsc, .xslt, .xz, .wb2, .wim , .wmv, .zip, .3fr, .3gp, .7z

When all files get encrypted, you will notice that the files will have this extension appended to them – .id-[eight digit number][email protected].

Afterward, the ransomware will send the following information to a remote location:

Trojan ID
Compromised computer ID
Host name
Email address used by the Trojan
Number of encrypted document, archive, database, and image files
Total number of encrypted files

Source: Symantec

Drugvokrug727 ransomware probably deletes the Shadow Volume Copies of the Windows Operating System. Read on to learn how to possibly decrypt your files.

Remove Drugvokrug727 Virus and Restore .xtbl Files

If your computer got infected with the Drugvokrug727 ransomware, you should have some experience with removing viruses. You should get rid of this ransomware as quick as you can before it spreads further through the network and infects more files. You should remove the ransomware and follow the step-by-step instructions guide given below. To see how you can try to recover your data, check the step titled 3. Restore files encrypted by Drugvokrug727.

Manually delete Drugvokrug727 from your computer

Note! Substantial notification about the Drugvokrug727 threat: Manual removal of Drugvokrug727 requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Drugvokrug727 files and objects.
2. Find malicious files created by Drugvokrug727 on your PC.
3. Fix registry entries created by Drugvokrug727 on your PC.

Automatically remove Drugvokrug727 by downloading an advanced anti-malware program

1. Remove Drugvokrug727 with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by Drugvokrug727 in the future
3. Restore files encrypted by Drugvokrug727
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.