Clntend

Malware updated a month ago (2024-10-17T13:04:12.582Z)
Download STIX
Preview STIX
CLNTEND is a sophisticated Remote Access Tool (RAT) malware first discovered in April, employed by Tidrone attackers. It supports multiple network protocols for covert communication with its command-and-control servers, making it a potent tool in the hands of cybercriminals. This malware, along with another payload named CXCLNT, was typically deployed using remote desktop tools such as the open-source UltraVNC. These advanced malware variants were spread either through Enterprise Resource Planning (ERP) software or via remote desktops, enabling them to infiltrate victims' systems without detection. The threat actors often preferred to use misquoted names for their command-and-control server domains, such as symantecsecuritycloud[.]com, microsoftsvc[.]com, and windowswns[.]com. This tactic further enabled the stealthy operation of CLNTEND and CXCLNT. The execution flow between previous and recent activities involving these two malwares revealed an evolution in the attacker's tactics, techniques, and procedures (TTPs), demonstrating a continual refinement of their methods and tools. Both CLNTEND and CXCLNT backdoors are launched by sideloading a malicious Dynamic Link Library (DLL) through the Microsoft Word application, showcasing the attackers' innovative approach to system exploitation. The latest investigation into these TTPs and the evolution of tools like CXCLNT and CLNTEND presents a comprehensive view of the threat actor's behavior within victims' systems. It underscores the importance of maintaining robust cybersecurity measures to guard against such advanced threats.
Description last updated: 2024-10-17T12:16:30.258Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Cxclnt is a possible alias for Clntend. CXCLNT is a potent malware identified by researchers, designed to exploit and damage computer systems. This malicious software infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, CXCLNT has capabilities to upload and download files,
4
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Tool
Malware
Rat
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Clntend Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more