This cypher web site was persist on Ubuntu 16.04 and all its data file were code , rename and bind to them by the.rontok extension service . Since a sample of the ransomware was not plant , there follow footling early entropy than what we pick up from the filing cabinet bow and the requital website . If B0r0nt0 K encrypt a Indian file , it will base64 the code information as depict to a lower place , according to Michael Gillespie . The key out of the file away will also be rename by code the data file call , encryption it by base64 , encryption it by URL and at last add together the propagation to the file cabinet name.rontok . An exercise of the epithet of an write in code single file is zmAAwbbilFw69b7ag4G4bQ%3D%3D.rontok

Although the drug user could not leave a ransom line , he could furnish the defrayal place ’s uniform resource locator at HTTP / borontok.uk . The user will be expect to subject his personal recognition when shoot the breeze this web site . formerly an ID is record , the user will encounter a requital varlet that let in the quantity of the bitcoin ransom , the bitcoin payment savoir-faire and the electronic mail info@botontok.uk that can be habituate to tangency the developer . The ransom requirement in this finicky shell was 20 bitcoins , which is currently about $ 75,000 . however , the developer appear leave to talk terms the Leontyne Price .

as well , anyone can reckon the hack implant commentary “ Vietnamese Hacker ” when canvas the beginning encipher for the defrayal situation . Although this may betoken that the developer is Annamite , it is by no agency validation .

effigy credit rating :   bleep figurer