import os
import socket
import time
import base64
import random


def connect_c2():
    print("[*] Connecting to remote C2 server...")
    time.sleep(1)
    return False


def fake_keylogger():
    print("[*] Starting keylogger...")
    time.sleep(1)
    return "keystrokes_captured"


def fake_encrypt(data):
    for _ in range(50000):
        data = data[::-1]
    return data


def drop_payload():
    print("[*] Dropping malicious payload...")
    time.sleep(1)


p1 = "==gDjEgEy@@@"
p2 = "AAHbRyFms0@@@"
p3 = "NDc1FgsAVw@@@"
p4 = "wyOMdFH0Qh@@@"
p5 = "LzcDGMkwL"
payload = p1 + p2 + p3 + p4 + p5


def _0x9f3a(data):
    clean = data.replace("@@@", "")
    rev = clean[::-1]
    decoded = base64.b64decode(rev)
    key = "".join([chr(x) for x in [103, 104, 111, 115, 116]])  # ghost

    result = ""
    for i in range(len(decoded)):
        result += chr(decoded[i] ^ ord(key[i % len(key)]))

    return result


def run():
    connect_c2()
    fake_keylogger()
    drop_payload()

    print("[*] Executing encrypted payload...")
    time.sleep(2)

    print("flag{mera_raja_beta}")

    if random.randint(1, 100) == 50:
        print("[DEBUG] fallback decoder triggered...")


if __name__ == "__main__":
    run()
