Notepad++ as a Malware Delivery Platform: Detection and Defense Against Chrysalis

Summary:

The China-aligned APT group Lotus Blossom (also known as Billbug) has been identified with moderate confidence as responsible for a sophisticated supply-chain compromise involving Notepad++. The operation involved unauthorized access to update-related infrastructure to distribute a previously undocumented backdoor, designated Chrysalis. The campaign primarily targets government, telecommunications, aviation, and critical infrastructure organizations in Southeast Asia and Central America, establishing long-term, covert access through the abuse of trusted binaries, DLL side-loading, and extensive obfuscation techniques. Notably, the threat actors evaded conventional endpoint defenses by leveraging encrypted HTTPS command-and-control traffic masquerading as legitimate API endpoints and, in some variants, abusing Microsoft Warbird to execute shellcode in kernel context. This activity highlights the growing risk associated with trusted software misuse and underscores the need for enhanced supply-chain monitoring, behavioral detection, and zero-trust assumptions around widely deployed development tools.

Technical Description:

The attack chain begins with the execution of a malicious update.exe delivered following legitimate Notepad++ and GUP updater activity. The payload is packaged as an NSIS-based installer that creates a hidden directory under %AppData%\Bluetooth and stages additional components. To facilitate DLL sideloading, the installer deploys a renamed, legitimate Bitdefender Submission Wizard binary (BluetoothService.exe), which is forced to load a malicious log.dll. This DLL employs dynamic API hashing and custom encryption routines to decrypt and execute the Chrysalis backdoor in memory.

In more advanced variants, Chrysalis leverages a secondary loader that abuses Microsoft Warbird in combination with the undocumented NtQuerySystemInformation call (SystemCodeFlowTransition) to execute shellcode in kernel context, bypassing user-mode security controls. The backdoor establishes encrypted HTTPS command-and-control communication with infrastructure designed to resemble legitimate API endpoints and supports interactive command execution, file and process manipulation, persistence mechanisms, and self-removal capabilities. The details and technicalities of the attack campaign are discussed further.

Delivery and Infection Chain:

The campaign abuses a compromised Notepad++ update-related delivery path, in which a malicious update.exe is retrieved from attacker-controlled infrastructure following the legitimate execution of notepad++.exe and GUP.exe. The payload is presented as an NSIS installer, a technique frequently leveraged by Chinese APT groups to blend into normal

software installation workflows and reduce user suspicion during execution. The infection chain was identified as follows,

  • A malicious update.exe is downloaded from attacker-controlled infrastructure following legitimate execution of notepad++.exe and GUP.exe, masquerading as a routine update process.
  • The executable runs as an NSIS installer, creating a hidden directory under %AppData%\Bluetooth and dropping multiple payload components.
  • A renamed legitimate Bitdefender Submission Wizard binary (BluetoothService.exe) is executed to trigger DLL side-loading of a malicious log.dll.
  • The malicious DLL decrypts and executes the Chrysalis backdoor in memory using custom encryption and dynamic API resolution.
  • In advanced variants, a secondary loader abuses Microsoft Warbird via NtQuerySystemInformation (SystemCodeFlowTransition) to execute encrypted shellcode in kernel context, establishing stealthy and persistent access.

Technical Capabilities:

Chrysalis is a feature-rich espionage backdoor engineered for long-term persistence and stealth rather than opportunistic compromise. To avoid reliance on standard cryptographic APIs, it implements bespoke encryption based on a linear congruential generator to decode payloads. Static analysis and signature-based detection are further hindered through the use of hashed API resolution. Command-and-control communications are conducted over HTTPS, with URL patterns intentionally crafted to resemble legitimate API endpoints, allowing the malware to blend into normal network traffic. Supported functionality includes interactive command execution, file and directory enumeration, read/write/delete operations, remote process execution, payload staging, and configurable self-removal to eliminate artifacts during cleanup.

Beyond the primary backdoor, the campaign incorporates advanced loader components designed to bypass modern endpoint defenses. Certain variants exploit the undocumented NtQuerySystemInformation (SystemCodeFlowTransition) class in conjunction with Microsoft Warbird to decode and execute shellcode in kernel context, significantly reducing visibility to EDR and antivirus solutions by avoiding user-mode hooks. When combined with DLL side-loading and the use of trusted, signed binaries, these techniques reflect a mature tradecraft focused on minimizing detection while maintaining deep and persistent system access.

Attribution and Evolution:

Based on overlapping tradecraft, including the misuse of Bitdefender binaries for DLL side-loading, reuse of cryptographic material associated with earlier Cobalt Strike deployments, and consistent tooling patterns observed in prior operations, the activity is attributed to Lotus Blossom (Billbug) with moderate confidence. Compared to earlier campaigns centered on user-mode execution, the adoption of Microsoft Warbird represents a notable escalation in capability, indicating a shift toward more advanced evasion techniques and defense bypass strategies.

Active Campaign and Geographic Spread:

The active campaign primarily targets government, telecommunications, aviation, and critical infrastructure organizations in Southeast Asia and Central America. Observed command-and-control infrastructure responds to IP addresses across multiple geographic regions, including Malaysia, suggesting a distributed operational footprint. The targeted nature of victim selection and infrastructure design indicates a focused espionage campaign rather than indiscriminate or opportunistic compromise.

Conclusion:

This Notepad++-related supply-chain compromise demonstrates a significant evolution in Lotus Blossom’s operational maturity, combining kernel-level execution, covert loaders, and the abuse of trusted software to bypass contemporary security controls. To mitigate similar supply-chain threats, organizations should prioritize behavioral and memory-based detections, strengthen update and binary validation processes, and reassess trust assumptions associated with widely used developer tools.

Impact:

Successful exploitation enables persistent, covert access to compromised environments, facilitating credential theft, internal reconnaissance, data exfiltration, and lateral movement. The use of kernel-level execution techniques substantially reduces visibility for security teams, increasing the likelihood of long-term undetected compromise. Additionally, the abuse of trusted applications such as Notepad++ increases execution success within enterprise environments and amplifies overall risk.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Execution, Persistence, Defense Evasion, Command and Control, Exfiltration
Technique Name Supply-Chain Compromise, DLL Side-Loading, Process Injection, Encrypted Command and Control
Sub-Technique Name User-Executed Malicious Update, Abuse of Trusted Signed Binaries, Dynamic API Resolution, Native Windows API Abuse
Attack Type Malware
Targeted Applications Notepad++, Windows Native APIs
Region Impacted Southeast Asia, Central America
Industry Impacted Government, Telecommunications, Aviation, Critical Infrastructure
(IOCs) SHA-256 Hashes:
a511be5164dc1122fb5a7daa3eef9467e43d8458425b15a640235796006590c9
8ea8b83645fba6e23d48075a0d3fc73ad2ba515b4536710cda4f1f232718f53e
2da00de67720f5f13b17e9d985fe70f10f153da60c9ab1086fe58f069a156924
77bfea78def679aa1117f569a35e8fd1542df21f7e00e27f192c907e61d63a2e
3bdc4c0637591533f1d4198a72a33426c01f69bd2e15ceee547866f65e26b7ad
9276594e73cda1c69b7d265b3f08dc8fa84bf2d6599086b9acc0bb3745146600
f4d829739f2d6ba7e3ede83dad428a0ced1a703ec582fc73a4eee3df3704629a
4a52570eeaf9d27722377865df312e295a7a23c3b6eb991944c2ecd707cc9906
831e1ea13a1bd405f5bda2b9d8f2265f7b1db6c668dd2165ccc8a9c4c15ea7dd
0a9b8df968df41920b6ff07785cbfebe8bda29e6b512c94a3b2a83d10014d2fd
4c2ea8193f4a5db63b897a2d3ce127cc5d89687f380b97a1d91e0c8db542e4f8
e7cd605568c38bd6e0aba31045e1633205d0598c607a855e2e1bca4cca1c6eda
078a9e5c6c787e5532a7e728720cbafee9021bfec4a30e3c2be110748d7c43c5
b4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3
7add554a98d3a99b319f2127688356c1283ed073a084805f14e33b4f6a6126fd
fcc2765305bcd213b7558025b2039df2265c3e0b6401e4833123c461df2de51a

Domains:
api.skycloudcenter.com
api.wiresguard.com

IP Addresses:
95.179.213.0
61.4.102.97
59.110.7.32
124.222.137.114
CVE NA

Recommended Actions:

  • Immediately verify the integrity of all Notepad++ installations and associated update mechanisms to ensure they originate from trusted sources.
  • Scan affected and at-risk endpoints using advanced EDR or antivirus solutions to identify indicators such as update.exe, log.dll, and BluetoothService.exe.
  • Block and monitor network communications to suspicious domains and IP addresses associated with the campaign.
  • Implement application whitelisting and restrict execution of unsigned or unexpected binaries within sensitive environments.
  • Enable and monitor detailed logging for anomalous DLL loading, process injection, or shell execution indicative of Chrysalis activity.
  • Educate users on the risks of executing unexpected software updates, particularly for open-source applications, and enforce least privilege access controls.
  • Maintain regular backups of critical data and routinely test restoration procedures to reduce operational impact in the event of compromise.
  • Conduct a comprehensive review of supply-chain security for third-party software and consider additional validation mechanisms for software updates.

Reference:

https://cybersecuritynews.com/notepad-hack/