Names | Lucky Cat | |
Category | Malware | |
Type | Backdoor, Info stealer, Exfiltration | |
Description | (Dark Reading) Trend Micro researchers found two Android apps in the early phase of development that can communicate with Luckycat's command-and-control (C&C) server. The malware is currently capable of gathering information on the mobile device and uploading and downloading files as directed by the C&C server. Some of the features, including remote shell, are still under construction, and it's unclear just how the attackers plan to infect victims with the mobile malware, according to Trend Micro. | |
Information | <https://www.darkreading.com/attacks-breaches/luckycat-apt-campaign-building-android-malware/d/d-id/1138130> <https://blog.talosintelligence.com/2019/02/exilerat-shares-c2-with-luckycat.html> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/apk.luckycat> |
Last change to this tool card: 13 May 2020
Download this tool card in JSON format
Previous: Lslsass
Next: Luminosity RAT
Changed | Name | Country | Observed | ||
APT groups | |||||
Lucky Cat | ![]() | 2011 |
1 group listed (1 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |