Notepad++ Attack Breakdown Reveals Sophisticated Malware and Actionable IoCs


A complex espionage campaign attributed to Chinese APT group Lotus Blossom, active since 2009.

The investigation uncovered a sophisticated compromise of Notepad++ distribution infrastructure that delivered Chrysalis, a previously undocumented custom backdoor with extensive remote access capabilities.

The attack chain began at IP address 95.179.213.0, where execution of notepad++.exe and GUP.exe preceded download of a malicious update.exe file.

This NSIS installer deployed a renamed Bitdefender Submission Wizard executable to the hidden %AppData%Bluetooth directory for DLL sideloading.

When executed, it loaded a malicious log.dll that decrypted the Chrysalis backdoor using custom algorithms combining linear congruential generators, FNV-1a hashing, and MurmurHash finalization.

Execution diagram of update.exe (Source: Rapid7)

The Chrysalis backdoor reveals itself as a feature-rich implant implementing 15 distinct command capabilities.

Configuration data encrypted with RC4 key “qwhvb^435h&*7” disclosed the C2 URL https://api.skycloudcenter.com/a/chat/s/70521ddf-a2ef-4adf-9cf0-6d8e24aaa821, which deliberately mimics Deepseek API formatting to blend with legitimate traffic.

The URL resolves to Malaysian IP address 61.4.102.97. The backdoor communicates using user agent “Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.4044.92 Safari/537.36” to appear as standard browser traffic.

Command capabilities include spawning interactive reverse shells (4T), remote process execution (4V), file read/write operations (4Y, 4W, 4X), complete file transfer protocols (4c, 4d), self-removal functionality (4), and drive enumeration (4_).

A mutex “GlobalJdhfv_1.0.1” prevents multiple instances. Persistence is established through Windows service creation or registry modifications.

Chrysalis implements two sophisticated API hashing routines using FNV-1a with constant 0x811C9DC5 and MurmurHash finalization (0x85EBCA6B).

String obfuscation uses position-dependent character transformation combining bit rotations and XOR operations.

The main module uses hardcoded XOR key “gQ2JR&9;” applied five times through XOR, addition, and subtraction operations.

Investigators discovered ConsoleApplication2.exe, a loader exploiting Microsoft’s undocumented Warbird code protection framework.

Decrypted configuration (source: Rapid7)

The loader invokes NtQuerySystemInformation with SystemCodeFlowTransition parameter (0xB9) to execute embedded Metasploit block_api shellcode within Microsoft-signed binary memory.

This technique downloads Cobalt Strike beacons from api.wiresguard.com/users/system.

Forensic analysis uncovered a renamed Tiny-C-Compiler executing malicious C source code from conf.c.

 Execution flow followed by conf.c and other loaders (source: Rapid7)
 Execution flow followed by conf.c and other loaders (source: Rapid7)

The shellcode employs rolling XOR decryption before transferring execution to Cobalt Strike HTTPS beacon using http-get endpoint api.wiresguard.com/update/v1 and http-post endpoint api.wiresguard.com/api/FileUpload/submit.

According to Rapid7, threat intelligence pivoting identified four additional loader variants sharing identical Cobalt Strike configurations and the same public key, indicating coordinated campaign activity.

Attribution to Lotus Blossom is based on similarities with Symantec research, particularly the Bitdefender Submission Wizard DLL sideloading technique and shared infrastructure indicators.

The Chrysalis campaign demonstrates significant evolution in tradecraft, combining custom malware with commodity frameworks and rapid operationalization of public security research.

Organizations should monitor for hidden %AppData% directories containing executables, NtQuerySystemInformation abuse patterns, and suspicious Deepseek-style API traffic to detect potential compromise.

Indicators of compromise (IoCs)

update.exea511be5164dc1122fb5a7daa3eef9467e43d8458425b15a640235796006590c9
[NSIS.nsi]8ea8b83645fba6e23d48075a0d3fc73ad2ba515b4536710cda4f1f232718f53e
BluetoothService.exe2da00de67720f5f13b17e9d985fe70f10f153da60c9ab1086fe58f069a156924
BluetoothService77bfea78def679aa1117f569a35e8fd1542df21f7e00e27f192c907e61d63a2e
log.dll3bdc4c0637591533f1d4198a72a33426c01f69bd2e15ceee547866f65e26b7ad
u.bat9276594e73cda1c69b7d265b3f08dc8fa84bf2d6599086b9acc0bb3745146600
conf.cf4d829739f2d6ba7e3ede83dad428a0ced1a703ec582fc73a4eee3df3704629a
libtcc.dll4a52570eeaf9d27722377865df312e295a7a23c3b6eb991944c2ecd707cc9906
admin831e1ea13a1bd405f5bda2b9d8f2265f7b1db6c668dd2165ccc8a9c4c15ea7dd
loader10a9b8df968df41920b6ff07785cbfebe8bda29e6b512c94a3b2a83d10014d2fd
uffhxpSy4c2ea8193f4a5db63b897a2d3ce127cc5d89687f380b97a1d91e0c8db542e4f8
loader2e7cd605568c38bd6e0aba31045e1633205d0598c607a855e2e1bca4cca1c6eda
3yzr31vk078a9e5c6c787e5532a7e728720cbafee9021bfec4a30e3c2be110748d7c43c5
ConsoleApplication2.exeb4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3
system7add554a98d3a99b319f2127688356c1283ed073a084805f14e33b4f6a6126fd
s047t5g.exefcc2765305bcd213b7558025b2039df2265c3e0b6401e4833123c461df2de51a

Network indicators

95.179.213.0
api[.]skycloudcenter[.]com
api[.]wiresguard[.]com
61.4.102.97
59.110.7.32
124.222.137.114

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link