Navigating Malware Bazaar
Here are the steps and methods to search for malware samples on Malware Bazaar.
Before we get into the steps, please ensure our VM is set up, machine images taken, and precautions enforced. Do not Leeroy Jenkins this on your host machine. Obligatory disclaimer done.
Go to the website herp derp: https://https://bazaar.abuse.ch/ and click on MalwareBazaar database.

Browse around if you're feeling exploratory, or use the search bar and syntax to look for your intended sample. Malware Bazaar has some helpful syntax to help us find and filter our samples:

Hash Returns the exact sample with that hash. e.g.,
5d41402abc4b2a76b9719d911017c592Tag Returns samples with those attribute(s), but these are manually tagged by contributors. e.g.,
tag: agenttesla exe emotetSignature Returns samples with those attribute(s), but are based on antivirus/YARA detections. e.g.,
signature: agentteslaFile Type Returns samples with those filetype(s). e.g.,
file_type: exe docxFile Size Returns samples with those file size(s) expressed in bytes. Operators are: >, <, =, >=, <= e.g.,
file_size: >10000Date Returns samples which were first seen on the date. Format is YYYY-MM-DD. e.g.,
first_seen:>2025-12-01Country Returns samples with those country tags. Uses 2 letter country code. e.g.,
country: RUCombo Returns samples with multiple attributes. Chained with logical AND. e.g.,
tag: agentteslafile_type: execountry: CN
Once we have the results, click on the DL icon on the far right.

This warning page will pop up. The downloaded sample will be in an encrypted zip file to prevent accidental execution by user or by the OS indexing/previewing the file. But the zip file still contains a very real piece of malware, so only unzip it in an isolated and dedicated environment like FlareVM.
Last updated