Critical Hunting Guide TLP:CLEAR CISA Verified

BRICKSTORM Backdoor

Threat Hunting Guide • 5-7 hours

Comprehensive hunting procedures for detecting BRICKSTORM backdoor deployed by PRC state-sponsored actors (UNC5221/WARP PANDA) targeting VMware vCenter and ESXi infrastructure. Based on CISA Analysis Report AR25-338A.

🎯
Hunt Modules
13
⏱️
Duration
5-7 hrs
🖥️
Target Systems
vCenter/ESXi
📋
Source
CISA
Avg Dwell Time
393 days
📄

Download Full Hunting Guide

Complete guide with 13 hunt modules, step-by-step procedures, detection queries (Splunk, KQL, Sigma), YARA rules, and CISA-verified IOCs.

13 Hunt Modules

1
Asset Inventory Validation
20-30 min • High
2
Self-Watching Persistence Detection
30-45 min • Critical
3
DNS-over-HTTPS C2 Detection
45 min • Critical
4
BrickStorm Binary Detection
30-45 min • Critical
5
PATH Environment Poisoning
20-30 min • High
6
VSOCK Inter-VM Tunneling
30 min • High
7
Boot Initialization Persistence
20-30 min • High
8
SOCKS Proxy Lateral Movement
30 min • High
9
VMware Account Analysis
30 min • High
10
Windows Variant Detection
30-45 min • High
11
Junction & GuestConduit Detection
20-30 min • High
12
Cloud Pivot Detection (Azure/M365)
30-45 min • High
13
Initial Access Vector Analysis
20-30 min • Critical

Detection Rules

Copy these queries to detect BRICKSTORM activity in your environment.

DNS-over-HTTPS from Infrastructure Servers

index=firewall OR index=proxy
(dest_ip IN ("8.8.8.8","8.8.4.4","1.1.1.1","1.0.0.1","9.9.9.9","9.9.9.11","149.112.112.11","45.90.28.160"))
dest_port=443
| search src_ip IN (vcenter*, esxi*, 10.0.1.*)
| stats count earliest(_time) as first_seen latest(_time) as last_seen by src_ip, dest_ip
| convert ctime(first_seen) ctime(last_seen)
| where count > 0

vCenter Pivot Activity Detection

index=firewall src_ip IN (vcenter*, esxi*)
| stats dc(dest_ip) as targets, dc(dest_port) as ports by src_ip
| where targets > 20 OR ports > 10

Need More Detection Rules?

The full guide includes 20+ additional detection signatures, YARA rules, and hunt procedures.

Download Full Guide

Disclaimer: These detection rules are provided for defensive security purposes. Always test rules in a non-production environment before deployment. Rules may require tuning for your specific environment. Based on CISA AR25-338A.

Key Indicators (CISA Verified)

File Names

vmsrc, vnetd, if-up, viocli, vts, vmckd, vmware-sphere, updatemgr, vami

File Paths

/etc/sysconfig/
/opt/vmware/sbin/
/usr/java/jre-vmware/bin/
/etc/applmgmt/appliance/

Network Indicators

TCP 8090 (Junction)
VSOCK 5555 (GuestConduit)
TCP 8300 (SPAWNSNAIL)
DoH: 1.1.1.1, 8.8.8.8, 9.9.9.9

Environment Variables

VMware → vmware-sphere
CZePMeGj → vami
FIOON → updatemgr

Full IOC list with SHA256 hashes available in the PDF download.

🛡️

Automate Your Threat Hunting

BRACE continuously monitors for BRICKSTORM indicators and 100+ other threat actors. Get automated detection rules deployed to your SIEM.