
| Names | FunnyDream | |
| Category | Malware | |
| Type | Backdoor, Dropper, Loader, Exfiltration | |
| Description | (Bitdefender) The attackers used the backdoor prevalently as DLL files, but we observed an executable to be used as well. The files we found implement many persistence mechanisms, their droppers and loaders use many different file names for the payload, all of that suggesting that the backdoor is custom made. | |
| Information | <https://www.bitdefender.com/files/News/CaseStudies/study/379/Bitdefender-Whitepaper-Chinese-APT.pdf> <https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf> <https://nao-sec.org/2021/01/royal-road-redive.html> <https://insight-jp.nttsecurity.com/post/102glv5/pandas-new-arsenal-part-3-smanager> | |
| MITRE ATT&CK | <https://attack.mitre.org/software/S1044/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.funny_dream> | |
Last change to this tool card: 30 December 2022
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| FunnyDream | 2018 | ||||
1 group listed (1 APT, 0 other, 0 unknown)
|
Infrastructure and Security Department Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||