Remove Drugvokrug727 Virus and Decrypt .xtbl Files - How to, Technology and PC Security Forum | SensorsTechForum.com
THREAT REMOVAL

Remove Drugvokrug727 Virus and Decrypt .xtbl Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Drugvokrug727 and other threats.
Threats such as Drugvokrug727 may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

STF-Drugvokrug727@india-com-ransomware-crypto-virus-the-dude-the-big-lebowski-desktop-screen-wallpaper

A variant of the Troldesh/Shade ransomware virus family has been spotted recently. The virus has been dubbed Drugvokrug727 because it uses the [email protected] email address. The wallpaper placed on a compromised computer features a digital sketch of the main character from the movie “The Big Lebowski” – the Dude. The ransomware locks files with an extension ending in .xtbl . The ransom price is unspecified. To see how to remove this ransomware and how you might restore your files, you should read the article to its end.

UPDATE! Kaspersky malware researchers have released a Shade decryptor which can decode files encoded by the the Shade ransomware variants. Since this includes the .xtbl file extension, we have created instructions on how to decrypt your .xtbl files. The instructions can be found on the link below:
Decrypt Files Encrypted by Shade Ransowmare

Threat Summary

NameDrugvokrug727
TypeRansomware, Crypto-Virus
Short DescriptionThe ransomware encrypts files with an extension ending in [email protected] and leaves an email address as a contact for the supposed decryption of the files.
SymptomsThe ransomware will run with each Windows start and encrypt files on your computer. Your wallpaper will be set to a picture with “The Dude” movie character and decrypt instructions pointing to an email address as a contact.
Distribution MethodSpam Emails, Email Attachments, Executable Files
Detection Tool See If Your System Has Been Affected by Drugvokrug727

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Drugvokrug727.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Drugvokrug727 Virus – Methods of Distribution

The Drugvokrug727 ransomware virus probably has more than one distribution method. Targeted attacks are surely one of the main methods, as well as spam email campaigns. A spam email will try to engage you into reading it and opening a file attached to that email. The attachment may seem harmless and of known file type, but in reality to be the payload source for the ransomware. Be extremely careful around emails that have attachments or download links in their body.

A possibility exists, where Drugvokrug727 virus can infect you through social media services or via file-sharing networks. Platforms and websites of that kind might distribute the malicious payload code with executables or batch files, disguised as necessary and useful software applications. An important advice you could follow to prevent ransomware viruses from infecting you is to avoid every email, file or link that seems suspicious and is of an unknown origin. Refrain from directly opening files in general – check their signatures, size and possibly scan them with a security program. You can find more tips about countering and preventing ransomware infections in the respective topic in our forum.

Drugvokrug727 Virus – A Closer Look

Drugvokrug727 is how a virus has been dubbed, belonging to the Shade/Troldesh ransomware family a.k.a. the XTBL ransomware. The name of this virus is derived from the email that its creator uses for contact – [email protected]. As other ransomware viruses of the same family, this one also puts that email in the extension of each encrypted file.

Here are more variants of this ransomware virus:

The ransomware will encrypt files found on your hard disk drives or other storage devices, but system files will not be touched. Before the encryption process begins, the ransomware goes through some predefined stages. After the ransomware finds an entry point to your computer and its payload file is executed, the malicious script found inside will initiate the following:

First, it will create five files, some of which are executables and some contain instructions:

%UserProfile%\How to decrypt your files.jpg

%System%\[THREAT FILE NAME].exe

%UserProfile%\Start Menu\Programs\Startup\[THREAT FILE NAME].exe

%UserProfile%\Start Menu\Programs\Startup\How to decrypt your files.jpg

%UserProfile%\Start Menu\Programs\Startup\How to decrypt your files.txt

Second, it will create this entry in the Windows Registry:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\”[RANDOM CHARACTERS]” = “%System%\[THREAT FILE NAME].exe”

That registry entry will keep the ransomware virus perseverant and launch it with every start of the Windows Operating System.

Third, it will then connect to a remote location, which may be one of the following:
  • jfheubdh.cc
  • kurvilkazz.ru
  • rrpproxy.net
  • dd24.net
  • key-systems.net
  • keydrive.lu
  • avtomoika234.cc
  • tuginsaat.com

Source: Symantec

Next, your files get encrypted, and after that process is complete, you will notice your desktop background to be swapped with some new wallpaper. That wallpaper contains instructions about how to contact the ransomware makers. Also, in the picture, there is a famous movie character portrayed – The Dude from the movie “The Big Lebowski”. That is how your desktop will look like if you got infected:

STF-Drugvokrug727@india-com-ransomware-crypto-virus-the-dude-the-big-lebowski-desktop-screen-wallpaper

That picture on your desktop and a text file with instructions bear the name How to decrypt your files. The text on the image shown above reads:

Дектиптор файлов можно
получить на почте:
[email protected]

Decryptor files are available
at the post office:
[email protected]

The other file – How to decrypt your files.txt looks like this:

STF-Drugvokrug727@india-com-ransomware-crypto-virus-the-dude-the-big-lebowski-how-to-decrypt-note

The Drugvokrug727 virus does not specify a payment price for the decryption of your files. Also, it does not urge you with a limited time period. The ransomware creator has left only a single email for contact, which the ransomware is named after by researchers.

Do NOT even try to contact the [email protected] email or any other alternative email address you could have been provided with from the virus. Even if you pay the ransom, you may not get your files back. See this comment posted in our blog by a user infected with ransomware of the same family. The user paid a fortune and didn’t get the courtesy of getting even a single file back.

So, paying criminals will technically make you their accomplice, as the money will be used to further their criminal activities. Also, because Drugvokrug727 is one of the many variants of the Shade/Troldesh ransomware family, there is a way you can try to restore your files. A decryptor tool manufactured by Kaspersky exists, and you can see it in the instructions below this article.

The Drugvokrug727 ransomware encrypts lots of different file types. The virus encrypts files which have these file extensions:

→.jpg, .jpg2, .png, .ppt, .pptm, .pptx, .bmp, .doc, .docm, .docx, .docxml, .pdf, .gif, .rtf, .tar, .targz, .targz2, .txt, .xlmv, .xls, .xlsm, .xlsx, .xml, .mkv, .mov , .mp4, .mpeg, .mpg, .msg, .myd, .myi, .obj, .odb, .odc, .odm, .ods, .oft,. one, .onepkg, .onetoc2, .opt, .oqy, .p7b, .p7c, .pcx, .pdd, .pdp, .pem, .pfx, .php, .php3, .php4, .php5, .phtml, .pl, .pm, .pot, .potm, .potx, .pps, .ppsn, .prn, .pst, .ptx, .pxr, .py, .ai3, .ai4, .ai5, .ai6, .arw, .as, .ASA, .ascx, .asmx, .asp, .aspx,. asr, .avi, .bak, .bay, .bz2, .c, .cdr, .cer, .cfc, .cfn, .cfnl, .cin, .chm, .class, .config, .cpp, .crt, .cs, .css, .csv, .cub, .dae, .db, .dc3, .dcm, .der, .dic, .dif, .divx, .djvu, .dl, .dot, .dotm , .dotx, .dpx, .dqy, .dtd, .dwg, .dx, .dxf, .dsn, .dwt, .eps, .exr, .fido,. frm, .gz, .h, .hpp, .hta, .htc, .htm, .html, .icb, .ics, .iff, .inc, .ind, .ini, .iqy, .j2c, .i2k, .java, .jp2, .jpc, .jpf, .jpx, .js, .jso, .json, .kmz, .lbi, .m4v, .mdb, .mdf, .mef , .mht, .mhtml, .r3d, .rar, .rdf, .rle , .rqy, .rss, .rw2, .rwl, .sct, .sdpx, .shtm, .shtml, .slk, .sln, .sql,. srw, .ssi, .stn, .svg, .svg2, .swf, .tdi, .tga, .tld, .u3d, .udl, .uxdc, .vcs, .vda, .wbm, .wbmp, .xlk, .xlm, .xltx, .xlw, .xsd, .xsl, .xsc, .xslt, .xz, .wb2, .wim , .wmv, .zip, .3fr, .3gp, .7z

When all files get encrypted, you will notice that the files will have this extension appended to them – .id-[eight digit number][email protected].

Afterward, the ransomware will send the following information to a remote location:

Trojan ID
Compromised computer ID
Host name
Email address used by the Trojan
Number of encrypted document, archive, database, and image files
Total number of encrypted files

Source: Symantec

Drugvokrug727 ransomware probably deletes the Shadow Volume Copies of the Windows Operating System. Read on to learn how to possibly decrypt your files.

Remove Drugvokrug727 Virus and Restore .xtbl Files

If your computer got infected with the Drugvokrug727 ransomware, you should have some experience with removing viruses. You should get rid of this ransomware as quick as you can before it spreads further through the network and infects more files. You should remove the ransomware and follow the step-by-step instructions guide given below. To see how you can try to recover your data, check the step titled 3. Restore files encrypted by Drugvokrug727.

Note! Your computer system may be affected by Drugvokrug727 and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Drugvokrug727.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove Drugvokrug727 follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove Drugvokrug727 files and objects
2. Find files created by Drugvokrug727 on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...