Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence

Cyber Threat Intelligence

Welcome back, aspiring cyberwarriors!

In the complex realm of cybersecurity, professionals face a continuously evolving landscape of digital threats. To address this challenge, MalwareBazaar was introduced as a collaborative defense platform, revolutionizing the way cybersecurity experts analyze and combat malicious software.

Conceived by abuse.ch, a distinguished Swiss cybersecurity research organization, MalwareBazaar collects known malicious malware sample, enriches them with additional intelligence and provides them back to the community – for free. The platform was born from a critical observation: traditional methods of malware detection and analysis were fragmented, slow, and woefully inadequate against the cyber threats of the modern era.

At its core, MalwareBazaar is more than a database – it is a living ecosystem of threat intelligence. The platform creates a unified environment where security researchers, organizations, and experts can rapidly exchange crucial information about emerging cyber threats.

The Collaborative Defense Mechanism

What truly sets MalwareBazaar apart is its commitment to collaborative defense. The platform transcends traditional boundaries of organizational and geographical limitations. A malware sample discovered in one corner of the world can be rapidly analyzed, classified, and shared with security professionals globally, creating a dynamic, real-time threat intelligence network.

This approach democratizes cybersecurity intelligence. Smaller organizations, which might lack extensive resources, gain access to the same high-quality threat information as large enterprises.

Getting Started With MalwareBazzar

To begin using MalwareBazaar, simply visit https://bazaar.abuse.ch/. You can search for and download samples without the need for registration.

By navigating to the “MalwareBazaar database” page, you can search for malware samples using various criteria, including hash values (MD5, SHA256, SHA1), imphash, TLSH hash, ClamAV signature, tags, or malware family.

The search syntax for Malware Bazaar follows this format: keyword:search_term. Below is a list of accepted keywords with example search terms:

  • md5: md5:1b109efade90ace7d953507adb1f1563

  • sha256: sha256:11b16ba733f2f4f10ac58021eecaf5668551a73e2a1acfae99745c50bfccbb44

  • signature: signature:CobaltStrike

  • tag: tag:TA505

  • file_type: file_type:rtf

  • user: user:malware_traffic

  • clamav: clamav:SecuriteInfo.com.Artemis1FBB04F6EAF7.17086.UNOFFICIAL

  • yara: yara:win_asyncrat_j1

  • serial_number: serial_number:51CD5393514F7ACE2B407C3DBFB09D8D

  • issuer_cn: issuer_cn:Sectigo RSA Code Signing CA

  • imphash: imphash:756fdea446bc618b4804509775306c0d

  • tlsh: tlsh:8DD484F440EF10A2F25F852936ADBE9401B2B1C7DBDA5E08137DE5311BBDA633A0564D

  • telfhash: telfhash:52d0a7c198b4972c99e60578ed5c5bb29106216620070b20cf10a5d4d83b440f40db59

  • gimphash: gimphash:b43f35a8610180bcb184238555a0858a6c160a2d872566e7e9633221308b34fd

  • dhash_icon: dhash_icon:f8dcbeffbffecee8

For instance, let’s try to find samples of Conti ransomware. Conti is a malware developed by the Russia-based hacking group “Wizard Spider” in December 2019. Since its creation, it has evolved into a full-fledged ransomware-as-a-service (RaaS) operation, used by various threat actor groups to carry out ransomware attacks.

To find these samples, you can search using keywords related to Conti, such as:

  • signature: signature:Conti

  • tag: tag:Conti

  • file_type: file_type:exe (or other file types)

By clicking on the hash, we can access additional information such as the first time the sample was observed, vendor detection details, and more. From there, you can also download the sample for further analysis. I think it goes without saying that attackers can download these samples and use them as well.

 

Why MalwareBazaar?

Many IT-security researchers heavily rely on publicly available information (OSINT) to hunt down new cyber threats, and OSINT is an invaluable resource for gathering threat intelligence. However, researchers often face a simple yet significant problem: malware samples referenced in blog posts, whitepapers, or mentioned on social media platforms like Twitter are typically not easily accessible. To obtain the malware samples needed for analysis, researchers are required to register on multiple online anti-virus scanning engines, sandboxes, or malware databases. The situation is even more challenging as some of these platforms impose download restrictions (limiting the number of samples that can be downloaded per day), while others are only accessible to paying users. This becomes a major obstacle in daily work.

This was the driving force behind the creation of MalwareBazaar – a platform that enables IT-security researchers to easily share malware samples with the community, without encountering download restrictions or having to pay expensive subscription fees.

What’s The Difference Between MalwareBazaar And VirusTotal?

VirusTotal is a fantastic resource for threat intelligence and malware hunting. Unlike MalwareBazaar, VirusTotal operates as a multi-anti-virus scanner, allowing you to assess whether a specific file is malicious or benign.

However, there are a few limitations with VirusTotal:

  • While you can upload as many files as you’d like to VirusTotal, downloading malware samples is restricted to paying users only.

  • As of March 2020, only about one-third of all uploaded files are detected by at least one AV engine (according to VirusTotal statistics). This means that two-thirds of the uploaded samples are considered benign.

On the other hand, MalwareBazaar takes a different approach:

  • MalwareBazaar focuses solely on tracking malware samples – no adware (PUA/PUP) or benign files.

  • Unlike VirusTotal, MalwareBazaar is not a multi-anti-virus scanning engine.

  • You can upload and download as many malware samples as you want, without any restrictions.

  • It’s completely free!

Summary:

In an era of increasingly complex digital risks, MalwareBazaar stands as a powerful example of collective intelligence. It transforms the fragmented cybersecurity landscape into a cohesive, dynamic ecosystem where knowledge is shared and threats are rapidly identified.