LuckyCat.A connects to a command and control (C&C) server that further instructs the malware to perform certain actions.
LuckyCat.A may be connected to an advanced persistent threat (APT) campaign that shares the same name. The were reports on LuckyCat campaign targeting the Indian and Japanese military research institution, and Chinese hackers were believed to be responsible behind the campaign.
LuckyCat.A's icon and screenshot
LuckyCat.A exhibits remote access trojan (RAT) capabilities, and connects to a command and control (C&C) server that further instructs the malware to perform these actions:
For additional reading on the LuckyCat APT campaign, please refer to the article 'LuckyCat' APT Campaign Building Android Malware.
Date Created: -
Date Last Modified: -