General

  • Target

    e696fbca4795eb850046b99d1f1009bce3051acbc387c1535177a0b7bcddea33

  • Size

    2.6MB

  • MD5

    396037d1a020eb6997ea029eaaf27edb

  • SHA1

    a7973a3503059661ca6f0e35ddd94b144ef94a0a

  • SHA256

    e696fbca4795eb850046b99d1f1009bce3051acbc387c1535177a0b7bcddea33

  • SHA512

    6d313376485f0192040de4eb709d6cd20007d41e7d43b4171cb6a7010505a2f50c6841a68c8ba148c83e89f406816046893b95ca2e37fb83df3b9056b48fa95f

  • SSDEEP

    49152:lPChGHIsyXKX1Po/4ktO2Bm8swDcdXcyej/V7mQicMzOsp6uowB4qYY:l6hGoQRE4JD9WJ7HkOCz/B4qn

Score
3/10

Malware Config

Signatures

  • Unsigned PE 23 IoCs

    Checks for missing Authenticode signature.

Files

  • e696fbca4795eb850046b99d1f1009bce3051acbc387c1535177a0b7bcddea33
    .zip
  • baby-llama.exe
    .exe windows:6 windows x64

    b76400803ccc2b8ebad114c62a65fe89


    Headers

    Imports

    Sections

  • benchmark.exe
    .exe windows:6 windows x64

    0bacff0694c6475b427307f065cc4cb1


    Headers

    Imports

    Sections

  • convert-llama2c-to-ggml.exe
    .exe windows:6 windows x64

    ed4a7e770b8791fdc56d81bcf04a1d1f


    Headers

    Imports

    Sections

  • embd-input-test.exe
    .exe windows:6 windows x64

    88593327ab3d2aaad69eca65ce8bb99b


    Headers

    Imports

    Sections

  • embedding.exe
    .exe windows:6 windows x64

    fbf025717ec84cca275af5ebf0f84a3a


    Headers

    Imports

    Sections

  • llama-bench.exe
    .exe windows:6 windows x64

    72b0b53fbeea2f3429c6df95f8d9cfd3


    Headers

    Imports

    Sections

  • llama.cpp.txt
  • main.exe
    .exe windows:6 windows x64

    a7a0472acdc19c7510af93b5da5d1439


    Headers

    Imports

    Sections

  • perplexity.exe
    .exe windows:6 windows x64

    3298e9ec849c3fdfb9a26a26753bb860


    Headers

    Imports

    Sections

  • q8dot.exe
    .exe windows:6 windows x64

    bac879311947099c6075e891f8fc321f


    Headers

    Imports

    Sections

  • quantize-stats.exe
    .exe windows:6 windows x64

    075a66503697154e142ceb1c5baf3695


    Headers

    Imports

    Sections

  • quantize.exe
    .exe windows:6 windows x64

    dab6db876a591553b785722f7b991f37


    Headers

    Imports

    Sections

  • save-load-state.exe
    .exe windows:6 windows x64

    e24f8026716450e5868ddaa3edc42ca9


    Headers

    Imports

    Sections

  • server.exe
    .exe windows:6 windows x64

    3cae72889ff22bd7cd0b14c095ed5893


    Headers

    Imports

    Sections

  • simple.exe
    .exe windows:6 windows x64

    0ba4053348081819ec495882d351f0ef


    Headers

    Imports

    Sections

  • test-grad0.exe
    .exe windows:6 windows x64

    8fb6534e5bc6ce167bc71af415e7bfb9


    Headers

    Imports

    Sections

  • test-grammar-parser.exe
    .exe windows:6 windows x64

    0c194038b0bccf5ccfb1dc586dead29f


    Headers

    Imports

    Sections

  • test-llama-grammar.exe
    .exe windows:6 windows x64

    b39de2c69a5da02e80de3f8e75f88fc2


    Headers

    Imports

    Sections

  • test-quantize-fns.exe
    .exe windows:6 windows x64

    f8e3eca86e6f5da56eb4ed4a1a57fb5b


    Headers

    Imports

    Sections

  • test-quantize-perf.exe
    .exe windows:6 windows x64

    d5183d9691644f91c3e7ad9f2d2948e8


    Headers

    Imports

    Sections

  • test-sampling.exe
    .exe windows:6 windows x64

    d5ffe9c2f77a32201352677f29dd16a3


    Headers

    Imports

    Sections

  • test-tokenizer-0.exe
    .exe windows:6 windows x64

    b9193bcadf65dd27adb37a9e7ee1a3d8


    Headers

    Imports

    Sections

  • train-text-from-scratch.exe
    .exe windows:6 windows x64

    ab96bcc42e2c5b6105ca18c87db653e1


    Headers

    Imports

    Sections

  • vdot.exe
    .exe windows:6 windows x64

    2607203f8c92576667a03dbff68f61cd


    Headers

    Imports

    Sections