Technical Analysis & Remediation
Attack Vector & Infection Chain
The compromise leverages an infrastructure-level redirect. When a victim's legitimate notepad++.exe triggers GUP.exe to check for updates, the traffic is intercepted and redirected from notepad-plus-plus.org to the attacker-controlled IP 95[.]179[.]213[.]0.
Initial Payload
The victim downloads a malicious update.exe, which is actually an NSIS installer.
Installation
The script creates a hidden directory at %AppData%\Bluetooth and drops the following artifacts:
BluetoothService.exe
A renamed, legitimate Bitdefender Submission Wizard executable.
log.dll
The malicious loader library.
BluetoothService
Encrypted shellcode payload.
Advanced Evasion & Loader Mechanics
The attack employs DLL Sideloading. When BluetoothService.exe runs, it automatically loads the adjacent malicious log.dll instead of the legitimate library.
Warbird Abuse
A separate loader sample, ConsoleApplication2.exe, was observed abusing Microsoft Warbird (a licensing/code protection framework) to conceal shellcode execution and evade EDR hooks.
Encryption
The malware uses a custom runtime decryption routine. The main module is decrypted using a rolling XOR operations with the hardcoded key gQ2JR&9;.
API Hashing
The loader uses FNV-1a hashing with a MurmurHash-style finalizer to resolve APIs dynamically, bypassing static analysis.
The Chrysalis Backdoor
Once decrypted, the Chrysalis implant executes in memory.
C2 Communication
It contacts api.skycloudcenter.com (resolving to 61[.]4[.]102[.]97) over port 443.
Traffic Masquerading
The URL structure /a/chat/s/{GUID} mimics the Deepseek API to blend in with legitimate AI traffic.
Capabilities
The backdoor supports 16 commands, including:
4T
Interactive cmd[.]exe reverse shell.
4V
Remote process creation.
4W / 4X
File writing (dropping payloads).
4\
Self-removal and cleanup.
Forensic Indicators (Anchors)
Mutex
Global\\Jdhfv_1.0.1 (Used to enforce single instance).
RC4 Key
qwhvb^435h&*7 (Used for config decryption).
User Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.4044.92 Safari/537.36.
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Network Block
Immediately block egress to 95[.]179[.]213[.]0 and 61[.]4[.]102[.]97. Blacklist the domain api.skycloudcenter.com.
Hunt for Mutex
Scan fleet memory for the mutex Global\\Jdhfv_1.0.1.
File System Sweep
Search for the existence of %AppData%\Bluetooth\ and the file BluetoothService.exe.
Process Isolation
Terminate any instances of BluetoothService.exe or update.exe spawning from GUP.exe.
Phase 2: Eradication
Binary Removal
Delete the malicious %AppData%\Bluetooth directory.
Persistence Removal
The malware installs persistence via Windows Service or Registry (Run key) pointing to the binary with the -i flag. Audit services and Run keys for references to BluetoothService.exe.
Root Cause
The vulnerability is in the update infrastructure, not the Notepad++ binary itself (though older updaters lacked strict validation).
Phase 3: Recovery
Reimage
Due to the backdoor's "interactive shell" capability (4T), compromised hosts must be considered fully owned. Reimaging is the only safe recovery method.
Patch
Update Notepad++ to version 8.9.1 or later, which includes hardened signature verification for updates (based on live search context).
Phase 4: Lessons Learned
Supply Chain Review
Audit all software update mechanisms. Restrict GUP.exe (Notepad++ updater) from internet access via firewall rules if centralized patch management is available.
Remediation - THE HOME USER TRACK
Disconnect
Immediately disconnect the infected computer from the internet.
Safety Scan
Since this backdoor allows full remote control, run a full offline antivirus scan.
Manual Removal
Open File Explorer and navigate to %AppData% (type %AppData% in the address bar).
Look for a folder named Bluetooth (ensure "Hidden items" are visible).
If found, this confirms infection. Delete the folder.
Software Update
Uninstall your current version of Notepad++. Download the latest version (v8.9.1+) only from the official notepad-plus-plus.org website or the Microsoft Store.
Password Reset
Because the attacker had shell access, reset all passwords (email, banking, social) using a different, clean device.
Hardening & References
MITRE ATT&CK
T1195.002
Supply Chain Compromise (Software Supply Chain).
T1574.002
Hijack Execution Flow: DLL Side-Loading.
T1027
Obfuscated Files or Information (Warbird/Encrypted Shellcode).
T1140
Deobfuscate/Decode Files or Information.
YARA/Sigma Logic
Alert on process BluetoothService.exe running from %AppData%.
Alert on network traffic to /a/chat/s/ URI patterns.
Reference
Rapid7 Labs Report
Targeted Software (Notepad++)