BRICKSTORM Backdoor
Threat Hunting Guide • 5-7 hours
Comprehensive hunting procedures for detecting BRICKSTORM backdoor deployed by PRC state-sponsored actors (UNC5221/WARP PANDA) targeting VMware vCenter and ESXi infrastructure. Based on CISA Analysis Report AR25-338A.
Download Full Hunting Guide
Complete guide with 13 hunt modules, step-by-step procedures, detection queries (Splunk, KQL, Sigma), YARA rules, and CISA-verified IOCs.
13 Hunt Modules
Detection Rules
Copy these queries to detect BRICKSTORM activity in your environment.
DNS-over-HTTPS from Infrastructure Servers
index=firewall OR index=proxy
(dest_ip IN ("8.8.8.8","8.8.4.4","1.1.1.1","1.0.0.1","9.9.9.9","9.9.9.11","149.112.112.11","45.90.28.160"))
dest_port=443
| search src_ip IN (vcenter*, esxi*, 10.0.1.*)
| stats count earliest(_time) as first_seen latest(_time) as last_seen by src_ip, dest_ip
| convert ctime(first_seen) ctime(last_seen)
| where count > 0
vCenter Pivot Activity Detection
index=firewall src_ip IN (vcenter*, esxi*)
| stats dc(dest_ip) as targets, dc(dest_port) as ports by src_ip
| where targets > 20 OR ports > 10
Need More Detection Rules?
The full guide includes 20+ additional detection signatures, YARA rules, and hunt procedures.
Disclaimer: These detection rules are provided for defensive security purposes. Always test rules in a non-production environment before deployment. Rules may require tuning for your specific environment. Based on CISA AR25-338A.
Key Indicators (CISA Verified)
File Names
File Paths
/opt/vmware/sbin/
/usr/java/jre-vmware/bin/
/etc/applmgmt/appliance/
Network Indicators
VSOCK 5555 (GuestConduit)
TCP 8300 (SPAWNSNAIL)
DoH: 1.1.1.1, 8.8.8.8, 9.9.9.9
Environment Variables
CZePMeGj → vami
FIOON → updatemgr
Full IOC list with SHA256 hashes available in the PDF download.
Automate Your Threat Hunting
BRACE continuously monitors for BRICKSTORM indicators and 100+ other threat actors. Get automated detection rules deployed to your SIEM.