Notepad Plus Plus Compromised Chrysalis Backdoor Malware Detection Software

Notepad Plus Plus – Update Infrastructure Compromised by State-Sponsored “Lotus Blossom” Spies.
Download the Latest Chrysalis Backdoor Detection Software

3rd February, 2026 – updated 5th February

Link to Notepad++ Lotus Blossom Chrysalis Backdoor IOC RAT Malware Detection Software

BREAKING: Notepad++ Espionage Campaign Expands with New “Sagerunex” Backdoor & Antivirus Abuse

Updated: 5th February, 2026

A sophisticated cyber-espionage campaign targeting users of the popular text editor Notepad++ has escalated significantly. Security researchers have confirmed that the Advanced Persistent Threat (APT) group known as Lotus Blossom (also tracked as Billbug or Spring Dragon) has not only compromised the software’s update mechanism but is now deploying a second, more dangerous backdoor known as “Sagerunex.”

This campaign, which has been active for nearly six months, allows attackers to selectively intercept traffic and push malicious updates to high-value targets in government, telecommunications, and critical infrastructure sectors.

The “Chrysalis” & “Sagerunex” Backdoors

The attack relies on a technique called DLL Sideloading to trick the operating system into running malicious code. While initial reports focused on the abuse of a Bitdefender binary, new intelligence confirms the group is also exploiting a legitimate Trend Micro debugging tool (tmdbglog.exe) to load their malware.+1

Victims who believed they were downloading a standard security update instead received a malicious NSIS installer. Once executed, this installer drops a hidden payload that performs two critical actions:

  1. Deploys Chrysalis: A custom backdoor hidden inside a modified DLL (log.dll or tmdglog.dll).
  2. Installs Sagerunex: An advanced, memory-resident backdoor that mimics legitimate Windows services. It utilizes Microsoft Warbird—a complex code obfuscation technology—to hide its execution flow.

Unlike typical malware, the new Sagerunex variants tunnel their traffic through legitimate cloud services like Dropbox and Twitter (X), making the Command & Control (C2) traffic indistinguishable from normal user activity.

Timeline of the Breach

The compromise was not a momentary glitch but a sustained operation. Forensic analysis has established the following timeline:

  • June 2025: Attackers gain initial access to the Notepad++ hosting provider’s infrastructure.
  • June – September 2025: “Active Infection Phase.” Attackers redirect specific users to malicious servers.
  • September 2, 2025: Hosting provider performs a kernel update, temporarily severing access.
  • September – December 2, 2025: “Persistence Phase.” Attackers use stolen credentials and the Sagerunex backdoor to maintain access.
  • February 2026: Full details of the new Trend Micro sideloading technique and cloud-based C2 infrastructure are made public.

What To Do If You Suspect Compromise

Because “Sagerunex” and “Chrysalis” are designed for long-term persistence, simple deletion of files is not enough. The malware utilizes advanced evasion techniques, including “Timestomping” (altering file creation dates) to blend in.

If you detect indicators of this malware on your network:

  1. Isolate the machine immediately. Disconnect it from the network.
  2. Assume Identity Compromise. The attackers utilize tools like ChromeKatz to harvest saved browser passwords. Reset all credentials used on that device.
  3. Wipe and Re-image. Do not attempt to “clean” the infection. A full format and OS re-installation is the only safe remediation.

New Detection Tool Available (Re-scan using new tool after 5th Feb)

Given the complexity of these backdoors, we have updated our specialized Lotus Blossom IOC Detector to version 1.4.

This standalone tool is designed to hunt for the specific artifacts dropped by this campaign, including the newly discovered Trend Micro variants. It performs a four-tiered scan:

  1. Deep File System Scan: Recursively checks for specific sideloaded DLLs and Warbird-protected loaders.
  2. Registry Analysis: Scans for malicious persistence keys that survive reboots.
  3. Network Telemetry: Analyzes active connections for communication with known C2 nodes (e.g., 45.76.155.202).
  4. Recon File Check: Looks for hidden temporary files (VT001.tmp) used by the malware to store stolen system data.

[Download Lotus Blossom / Notepad++ Detection Tool v1.4] File: NotepadPlusPlusMalwareDetection-v1.4.zip

Important Usage Instructions: Download, UNZIP to a new folder, then right-click the detector and run as ‘Administrator’. (Note: This tool requires Administrator privileges to access protected system directories and network tables.)

Our software is certified (Ravtic LLC code signed) – safe, secure, private, and free to use. All code runs locally on your system.


Detailed Technical Breakdown

Below are the specific indicators the software detects. A match on both name and hash confirms a compromised system.

1. File System Artifacts (Malware Payload)

The tool scans the C: drive for these specific filenames.

Group A: Initial Infection (The Dropper)

  • update.exe
    • Description: The malicious NSIS installer mimicking a Notepad++ update.
    • Hash: a511be5164dc1122fb5a7daa3eef9467e43d8458425b15a640235796006590c9

Group B: The Chrysalis Backdoor (Bitdefender Variant)

  • BluetoothService.exe
    • Description: A legitimate Bitdefender binary renamed and abused to side-load the malicious DLL.
    • Hash: 2da00de67720f5f13b17e9d985fe70f10f153da60c9ab1086fe58f069a156924
  • log.dll
    • Description: The actual Chrysalis malware loaded by the Bitdefender binary.
    • Hash: 3bdc4c0637591533f1d4198a72a33426c01f69bd2e15ceee547866f65e26b7ad

Group C: The Chrysalis Backdoor (Trend Micro Variant) — NEW

  • tmdbglog.exe
    • Description: Legitimate Trend Micro debugging tool abused for sideloading.
    • Hash: f9036b967aaadf51fe0a7017c87086c7839be73efabb234e2c21885a6840343e
  • tmdglog.dll
    • Description: Malicious DLL loaded by the Trend Micro executable.
    • Hash: b75a161caab0a90ef5ce57b889534b5809af3ce2f566af79da9184eaa41135bd

Group D: Loaders & Evasion Variants

  • ConsoleApplication2.exe
    • Description: Specialized loader using Microsoft Warbird obfuscation.
    • Hash: b4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3
  • loader1 / loader2
    • Description: Variant loaders found in public repositories.
    • Hash: 0a9b8df968df41920b6ff07785cbfebe8bda29e6b512c94a3b2a83d10014d2fd (Loader 1)

Group E: Tools & Clean-up

  • u.bat
    • Description: Batch script used by the malware to delete itself.
    • Hash: 9276594e73cda1c69b7d265b3f08dc8fa84bf2d6599086b9acc0bb3745146600
  • datechanger.exe
    • Description: “Timestomping” tool used to alter file creation dates to hide tracks.
    • Hash: b337a3b55e9f6d72e22fe55aba4105805bb0cf121087a3f6c79850705593d904

2. Active Network Connections

The tool scans for active TCP connections to the following attacker infrastructure:

  • 95.179.213.0 (Malicious Update Host)
  • 61.4.102.97 (C2 Server – Malaysia)
  • 45.76.155.202 (NEW – C2 Server)
  • 51.91.79.17 (NEW – C2 Server)

3. DNS Cache History

The tool checks if the machine has previously resolved these domains:

  • api.skycloudcenter.com (Primary C2)
  • api.wiresguard.com (Cobalt Strike Beacon)
  • temp.sh (NEW – Exfiltration Site)

Similar Posts

Leave a Reply