TRAILBLAZE is an in-memory dropper used to deploy the passive backdoor BRUSHFIRE. First reported in March 2025, TRAILBLAZE has been observed in operations attributed to People's Republic of China (PRC) state-sponsored affiliated actors, including UNC5221 and SYLVANITE. [1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
TRAILBLAZE has the ability to delete temporary files and contents in specified directories to cover its tracks.[2][3] |
| Enterprise | T1106 | Native API |
TRAILBLAZE has leveraged raw syscalls to execute commands.[2][3] |
|
| Enterprise | T1057 | Process Discovery |
TRAILBLAZE has conducted process discovery by searching for specific named processes such as |
|
| Enterprise | T1055 | .012 | Process Injection: Process Hollowing |
TRAILBLAZE has injected a hook into an existing process to load BRUSHFIRE in the spaces allocated memory to include the Ivanti Connect Secure (ICS) web process named |