mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 11:26:11 +00:00
f2ac1ece55
add
47 lines
1.3 KiB
C#
47 lines
1.3 KiB
C#
// Decompiled with JetBrains decompiler
|
|
// Type: e
|
|
// Assembly: Fugi, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null
|
|
// MVID: BEDD3B0B-7024-4DCA-82E7-4DC806657EA8
|
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00002-msil\Trojan-Dropper.Win32.Dapato.adjp-c7222843a23fc031926828311c4204ba181271a1dde91017bc4695dc95b5fc46.exe
|
|
|
|
using System.IO;
|
|
using System.Reflection;
|
|
|
|
internal sealed class e
|
|
{
|
|
public static string a(string a1, int a2) => ae.a(e.a.a.a(a1, a2));
|
|
|
|
public static string a => "79af91d13cf045e9";
|
|
|
|
private sealed class a
|
|
{
|
|
public static readonly e.a a;
|
|
private byte[] b;
|
|
|
|
static a()
|
|
{
|
|
b.a();
|
|
e.a.a = new e.a();
|
|
}
|
|
|
|
private a()
|
|
{
|
|
Stream manifestResourceStream = Assembly.GetExecutingAssembly().GetManifestResourceStream(e.a);
|
|
if (manifestResourceStream == null)
|
|
return;
|
|
this.b = new byte[256];
|
|
manifestResourceStream.Read(this.b, 0, this.b.Length);
|
|
}
|
|
|
|
public string a(string a1, int a2)
|
|
{
|
|
int index1 = af.a((object) a1);
|
|
int index2 = a2 & (int) byte.MaxValue;
|
|
char[] a = ag.a((object) a1);
|
|
while (--index1 >= 0)
|
|
a[index1] = (char) ((uint) a[index1] ^ ((uint) this.b[index2] | (uint) a2));
|
|
return ae.a(ah.a(a));
|
|
}
|
|
}
|
|
}
|