General

  • Target

    ed400f1d70c662a3bb48ee7b5fd1a21a097c5f6f1fd6dc497f1702b7d4777427

  • Size

    2.6MB

  • MD5

    45a8536d529d28c6e8eaf887f8bed7ca

  • SHA1

    aeedcfe6a57900385e910cbf27e12c819ae1d286

  • SHA256

    ed400f1d70c662a3bb48ee7b5fd1a21a097c5f6f1fd6dc497f1702b7d4777427

  • SHA512

    c7e3a18a09b03538666a5adaa61c5fd3bd38c6d2daa667ed59dd1bdfacacbea0c21996a163ea631f9a3f0a37df7b51bab0e1439bb36d293ba92366f310ad3181

  • SSDEEP

    49152:4ANoL7mvwX7orhfI87YU2PBHGGYdfcslgvUVqbU6K5ux4n7OenRVs9KbznYJObjk:jEqv88IXRScsloUQJ1wXnVzn4uiLV

Score
3/10

Malware Config

Signatures

  • Unsigned PE 23 IoCs

    Checks for missing Authenticode signature.

Files

  • ed400f1d70c662a3bb48ee7b5fd1a21a097c5f6f1fd6dc497f1702b7d4777427
    .zip
  • baby-llama.exe
    .exe windows:6 windows x64

    53b7723989eda88ce87b5a705de6683d


    Headers

    Imports

    Sections

  • benchmark.exe
    .exe windows:6 windows x64

    4fa351331dd96047b7ed20a7b0e18e18


    Headers

    Imports

    Sections

  • convert-llama2c-to-ggml.exe
    .exe windows:6 windows x64

    e4b68ba255b1e8deba8220a4aba48c51


    Headers

    Imports

    Sections

  • embd-input-test.exe
    .exe windows:6 windows x64

    509f9433a0a0b10b43019383b98cae81


    Headers

    Imports

    Sections

  • embedding.exe
    .exe windows:6 windows x64

    b387294a2b29c6e586c4b42b90c24675


    Headers

    Imports

    Sections

  • llama-bench.exe
    .exe windows:6 windows x64

    cc51e61bf56fd03a429a12460b7ba220


    Headers

    Imports

    Sections

  • llama.cpp.txt
  • main.exe
    .exe windows:6 windows x64

    e5a1a8c4f8ffefb508a6e61e2a375799


    Headers

    Imports

    Sections

  • perplexity.exe
    .exe windows:6 windows x64

    e223cefca8ede28d00738c5195eb926f


    Headers

    Imports

    Sections

  • q8dot.exe
    .exe windows:6 windows x64

    a9840bed1c53ce92db0fd3359d00dbd9


    Headers

    Imports

    Sections

  • quantize-stats.exe
    .exe windows:6 windows x64

    9373eab86126bb50bc4dd369914a2889


    Headers

    Imports

    Sections

  • quantize.exe
    .exe windows:6 windows x64

    9c4b645dfc33f42efb274e9e0ed19b6f


    Headers

    Imports

    Sections

  • save-load-state.exe
    .exe windows:6 windows x64

    1ef27c1d1718e1484450d4cab7baa1cb


    Headers

    Imports

    Sections

  • server.exe
    .exe windows:6 windows x64

    d6cb121aa9e423442494b44c94c0ebf8


    Headers

    Imports

    Sections

  • simple.exe
    .exe windows:6 windows x64

    082417a823d5e986801eff47b8114182


    Headers

    Imports

    Sections

  • test-grad0.exe
    .exe windows:6 windows x64

    dc7125ff41d0efe6123069c4813bf54e


    Headers

    Imports

    Sections

  • test-grammar-parser.exe
    .exe windows:6 windows x64

    0c194038b0bccf5ccfb1dc586dead29f


    Headers

    Imports

    Sections

  • test-llama-grammar.exe
    .exe windows:6 windows x64

    ca87e9ecdc90845fb816116d77a2706e


    Headers

    Imports

    Sections

  • test-quantize-fns.exe
    .exe windows:6 windows x64

    eb0ae62c6e4f05e268f4e44f7c330b7e


    Headers

    Imports

    Sections

  • test-quantize-perf.exe
    .exe windows:6 windows x64

    57544b65a88004ef78857c7de1b7ddaf


    Headers

    Imports

    Sections

  • test-sampling.exe
    .exe windows:6 windows x64

    5ddceb57b8650206f18e5014ec0a3280


    Headers

    Imports

    Sections

  • test-tokenizer-0.exe
    .exe windows:6 windows x64

    ec5bf2c63fbeffc65f1ccd83d1f8f246


    Headers

    Imports

    Sections

  • train-text-from-scratch.exe
    .exe windows:6 windows x64

    b6ceba19bf2d426294a0743c3fc1af0c


    Headers

    Imports

    Sections

  • vdot.exe
    .exe windows:6 windows x64

    e6d79e51444e569b36b3a084f190cb57


    Headers

    Imports

    Sections