General

  • Target

    31c4fff46010fcef5d0acd570f4d004ecdb8a557872695556bcb862847a669f4

  • Size

    3.4MB

  • MD5

    5382b4539dd26120cec07dbbe3d56285

  • SHA1

    7ebb478ff64960a5889848bca9ed792b70f95248

  • SHA256

    31c4fff46010fcef5d0acd570f4d004ecdb8a557872695556bcb862847a669f4

  • SHA512

    5ee9dd528af8f575e05eb5985df39e2782a9223981df5750997c57dbafbad96a2fb4851ac40e175968b87724eb5511fe48617d921ce425b929dc14305f460abd

  • SSDEEP

    98304:nWgX/V1S3BApMDg1Jw0XdavpeJIb6FpENU4Np:nXq3pDgnZSbqETX

Score
3/10

Malware Config

Signatures

  • Unsigned PE 24 IoCs

    Checks for missing Authenticode signature.

Files

  • 31c4fff46010fcef5d0acd570f4d004ecdb8a557872695556bcb862847a669f4
    .zip
  • baby-llama.exe
    .exe windows:6 windows x64

    4077b5212d0896f104da15e0eca99fab


    Headers

    Imports

    Sections

  • benchmark.exe
    .exe windows:6 windows x64

    3ee0b87340285aa90b99ca3faa82189f


    Headers

    Imports

    Sections

  • convert-llama2c-to-ggml.exe
    .exe windows:6 windows x64

    25d4cfc08ffffc6b97b3d00fd2a16c97


    Headers

    Imports

    Sections

  • embd-input-test.exe
    .exe windows:6 windows x64

    047e1c0d5e43c31bd3a06cccb382563e


    Headers

    Imports

    Sections

  • embedding.exe
    .exe windows:6 windows x64

    2c50202bcb85cc20a889c4a106dfc532


    Headers

    Imports

    Sections

  • llama-bench.exe
    .exe windows:6 windows x64

    da37a765ed8d35ce7df289d56473c87e


    Headers

    Imports

    Sections

  • llama.cpp.txt
  • main.exe
    .exe windows:6 windows x64

    ce2d94ef7fe5892e48f20ca8f3efd37a


    Headers

    Imports

    Sections

  • perplexity.exe
    .exe windows:6 windows x64

    270a526f23c1514bfda3c850e0298cd9


    Headers

    Imports

    Sections

  • q8dot.exe
    .exe windows:6 windows x64

    b03440c2219516b4378cf90d17bfa55e


    Headers

    Imports

    Sections

  • quantize-stats.exe
    .exe windows:6 windows x64

    05eb58c171bb55869d3cc94015f72524


    Headers

    Imports

    Sections

  • quantize.exe
    .exe windows:6 windows x64

    f8855795b18f8ad4f1aa68281b46938e


    Headers

    Imports

    Sections

  • save-load-state.exe
    .exe windows:6 windows x64

    accec7255550a1533e45adbbc3622dc2


    Headers

    Imports

    Sections

  • server.exe
    .exe windows:6 windows x64

    25e6a04422b16042c02234b60a9947e6


    Headers

    Imports

    Sections

  • simple.exe
    .exe windows:6 windows x64

    0b0680e0b5ded5f353f24d032ceb2cac


    Headers

    Imports

    Sections

  • test-grad0.exe
    .exe windows:6 windows x64

    3a9abc799448cc8063ced0cc7ac06f1d


    Headers

    Imports

    Sections

  • test-grammar-parser.exe
    .exe windows:6 windows x64

    2946a45ab093b6cad2c1d299ae1becbd


    Headers

    Imports

    Sections

  • test-llama-grammar.exe
    .exe windows:6 windows x64

    f1693fc267cb16a6175dd25b19ddc45f


    Headers

    Imports

    Sections

  • test-quantize-fns.exe
    .exe windows:6 windows x64

    53bb0b4059e4093280103559e68c5b18


    Headers

    Imports

    Sections

  • test-quantize-perf.exe
    .exe windows:6 windows x64

    cf0aec8cb079f6b9f67f2f0eb54014ea


    Headers

    Imports

    Sections

  • test-sampling.exe
    .exe windows:6 windows x64

    cbaa0f15070c754f8e20c4a6e327d742


    Headers

    Imports

    Sections

  • test-tokenizer-0.exe
    .exe windows:6 windows x64

    a40a657fa612add50891c5b987b9f418


    Headers

    Imports

    Sections

  • test-tokenizer-1.exe
    .exe windows:6 windows x64

    86ea34619fe2b63c78950ebe9582f6cd


    Headers

    Imports

    Sections

  • train-text-from-scratch.exe
    .exe windows:6 windows x64

    562671df4ee58e1bdcb474ec09e4222b


    Headers

    Imports

    Sections

  • vdot.exe
    .exe windows:6 windows x64

    6f8584b0e8f5a8f5e4e1d36f42dd750c


    Headers

    Imports

    Sections