# FunnyDream
> Tipo: **malware** · S1044 · [MITRE ATT&CK](https://attack.mitre.org/software/S1044)
## Descrição
[[s1044-funnydream|FunnyDream]] é um backdoor com múltiplos componentes utilizado durante a campanha [[s1044-funnydream|FunnyDream]] desde pelo menos 2019, principalmente para execução de comandos e exfiltração de dados.
**Plataformas:** Windows
## Técnicas Utilizadas
- [[t1543-003-windows-service|T1543.003 - Windows Service]]
- [[t1547-001-registry-run-keys-startup-folder|T1547.001 - Registry Run Keys / Startup Folder]]
- [[t1047-windows-management-instrumentation|T1047 - Windows Management Instrumentation]]
- [[t1120-peripheral-device-discovery|T1120 - Peripheral Device Discovery]]
- [[t1074-001-local-data-staging|T1074.001 - Local Data Staging]]
- [[t1559-001-component-object-model|T1559.001 - Component Object Model]]
- [[t1218-011-rundll32|T1218.011 - Rundll32]]
- [[t1055-001-dynamic-link-library-injection|T1055.001 - Dynamic-link Library Injection]]
- [[t1572-protocol-tunneling|T1572 - Protocol Tunneling]]
- [[t1057-process-discovery|T1057 - Process Discovery]]
- [[t1036-004-masquerade-task-or-service|T1036.004 - Masquerade Task or Service]]
- [[t1041-exfiltration-over-c2-channel|T1041 - Exfiltration Over C2 Channel]]
- [[t1018-remote-system-discovery|T1018 - Remote System Discovery]]
- [[t1056-001-keylogging|T1056.001 - Keylogging]]
- [[t1016-system-network-configuration-discovery|T1016 - System Network Configuration Discovery]]
## Referências
- [MITRE ATT&CK - S1044](https://attack.mitre.org/software/S1044)