# FunnyDream > Tipo: **malware** · S1044 · [MITRE ATT&CK](https://attack.mitre.org/software/S1044) ## Descrição [[s1044-funnydream|FunnyDream]] é um backdoor com múltiplos componentes utilizado durante a campanha [[s1044-funnydream|FunnyDream]] desde pelo menos 2019, principalmente para execução de comandos e exfiltração de dados. **Plataformas:** Windows ## Técnicas Utilizadas - [[t1543-003-windows-service|T1543.003 - Windows Service]] - [[t1547-001-registry-run-keys-startup-folder|T1547.001 - Registry Run Keys / Startup Folder]] - [[t1047-windows-management-instrumentation|T1047 - Windows Management Instrumentation]] - [[t1120-peripheral-device-discovery|T1120 - Peripheral Device Discovery]] - [[t1074-001-local-data-staging|T1074.001 - Local Data Staging]] - [[t1559-001-component-object-model|T1559.001 - Component Object Model]] - [[t1218-011-rundll32|T1218.011 - Rundll32]] - [[t1055-001-dynamic-link-library-injection|T1055.001 - Dynamic-link Library Injection]] - [[t1572-protocol-tunneling|T1572 - Protocol Tunneling]] - [[t1057-process-discovery|T1057 - Process Discovery]] - [[t1036-004-masquerade-task-or-service|T1036.004 - Masquerade Task or Service]] - [[t1041-exfiltration-over-c2-channel|T1041 - Exfiltration Over C2 Channel]] - [[t1018-remote-system-discovery|T1018 - Remote System Discovery]] - [[t1056-001-keylogging|T1056.001 - Keylogging]] - [[t1016-system-network-configuration-discovery|T1016 - System Network Configuration Discovery]] ## Referências - [MITRE ATT&CK - S1044](https://attack.mitre.org/software/S1044)