TRAILBLAZE

TRAILBLAZE is an in-memory dropper used to deploy the passive backdoor BRUSHFIRE. First reported in March 2025, TRAILBLAZE has been observed in operations attributed to People's Republic of China (PRC) state-sponsored affiliated actors, including UNC5221 and SYLVANITE. [1][2][3]

ID: S9012
Type: MALWARE
Platforms: Linux, Network Devices
Contributors: Dragos Threat Intelligence
Version: 1.0
Created: 14 April 2026
Last Modified: 23 April 2026

Techniques Used

Domain ID Name Use
Enterprise T1070 .004 Indicator Removal: File Deletion

TRAILBLAZE has the ability to delete temporary files and contents in specified directories to cover its tracks.[2][3]

Enterprise T1106 Native API

TRAILBLAZE has leveraged raw syscalls to execute commands.[2][3]

Enterprise T1057 Process Discovery

TRAILBLAZE has conducted process discovery by searching for specific named processes such as /home/bin/web.[2][3]

Enterprise T1055 .012 Process Injection: Process Hollowing

TRAILBLAZE has injected a hook into an existing process to load BRUSHFIRE in the spaces allocated memory to include the Ivanti Connect Secure (ICS) web process named web.[2][3]

References