SYMBOLCOMMON_NAMEaka. SYNONYMS
win.alice_atm (Back to overview)

Project Alice

aka: PrAlice, AliceATM

There is no description at this point.

References
2019-05-30Talos IntelligenceVanja Svajcer
@online{svajcer:20190530:10:82553e1, author = {Vanja Svajcer}, title = {{10 years of virtual dynamite: A high-level retrospective of ATM malware}}, date = {2019-05-30}, organization = {Talos Intelligence}, url = {https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html}, language = {English}, urldate = {2019-11-24} } 10 years of virtual dynamite: A high-level retrospective of ATM malware
FastCash Project Alice Cutlet Ploutus ATM Skimer Tyupkin
2018-03-30Trend MicroDavid Sancho, Numaan Huq, Massimiliano Michenz
@techreport{sancho:20180330:cashing:b325dd3, author = {David Sancho and Numaan Huq and Massimiliano Michenz}, title = {{Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types}}, date = {2018-03-30}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf}, language = {English}, urldate = {2020-02-27} } Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2016-12-20Trend MicroDavid Sancho, Numaan Huq
@online{sancho:20161220:alice:048e628, author = {David Sancho and Numaan Huq}, title = {{Alice: A Lightweight, Compact, No-Nonsense ATM Malware}}, date = {2016-12-20}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/alice-lightweight-compact-no-nonsense-atm-malware/}, language = {English}, urldate = {2020-01-09} } Alice: A Lightweight, Compact, No-Nonsense ATM Malware
Project Alice
Yara Rules
[TLP:WHITE] win_alice_atm_auto (20220411 | Detects win.alice_atm.)
rule win_alice_atm_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-04-08"
        version = "1"
        description = "Detects win.alice_atm."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm"
        malpedia_rule_date = "20220405"
        malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a"
        malpedia_version = "20220411"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 68???????? 57 ff7514 e8???????? ff7609 e8???????? }
            // n = 6, score = 100
            //   68????????           |                     
            //   57                   | push                edi
            //   ff7514               | push                dword ptr [ebp + 0x14]
            //   e8????????           |                     
            //   ff7609               | push                dword ptr [esi + 9]
            //   e8????????           |                     

        $sequence_1 = { 0bff 7440 57 6a40 e8???????? 0bc0 7434 }
            // n = 7, score = 100
            //   0bff                 | or                  edi, edi
            //   7440                 | je                  0x42
            //   57                   | push                edi
            //   6a40                 | push                0x40
            //   e8????????           |                     
            //   0bc0                 | or                  eax, eax
            //   7434                 | je                  0x36

        $sequence_2 = { 0fb77e02 8bdf 6bff10 0bff 7440 57 6a40 }
            // n = 7, score = 100
            //   0fb77e02             | movzx               edi, word ptr [esi + 2]
            //   8bdf                 | mov                 ebx, edi
            //   6bff10               | imul                edi, edi, 0x10
            //   0bff                 | or                  edi, edi
            //   7440                 | je                  0x42
            //   57                   | push                edi
            //   6a40                 | push                0x40

        $sequence_3 = { 53 ff13 6a50 68???????? 53 ff13 }
            // n = 6, score = 100
            //   53                   | push                ebx
            //   ff13                 | call                dword ptr [ebx]
            //   6a50                 | push                0x50
            //   68????????           |                     
            //   53                   | push                ebx
            //   ff13                 | call                dword ptr [ebx]

        $sequence_4 = { e8???????? 8d5da8 68ec030000 ff7508 e8???????? }
            // n = 5, score = 100
            //   e8????????           |                     
            //   8d5da8               | lea                 ebx, dword ptr [ebp - 0x58]
            //   68ec030000           | push                0x3ec
            //   ff7508               | push                dword ptr [ebp + 8]
            //   e8????????           |                     

        $sequence_5 = { 0f8407010000 817e0c20202000 0f8480000000 ff36 68???????? 8d45f8 }
            // n = 6, score = 100
            //   0f8407010000         | je                  0x10d
            //   817e0c20202000       | cmp                 dword ptr [esi + 0xc], 0x202020
            //   0f8480000000         | je                  0x86
            //   ff36                 | push                dword ptr [esi]
            //   68????????           |                     
            //   8d45f8               | lea                 eax, dword ptr [ebp - 8]

        $sequence_6 = { 68???????? ff7514 e8???????? 8b45fc }
            // n = 4, score = 100
            //   68????????           |                     
            //   ff7514               | push                dword ptr [ebp + 0x14]
            //   e8????????           |                     
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]

        $sequence_7 = { c74310f7164000 c743142a174000 c7431842174000 c7431c5a174000 }
            // n = 4, score = 100
            //   c74310f7164000       | mov                 dword ptr [ebx + 0x10], 0x4016f7
            //   c743142a174000       | mov                 dword ptr [ebx + 0x14], 0x40172a
            //   c7431842174000       | mov                 dword ptr [ebx + 0x18], 0x401742
            //   c7431c5a174000       | mov                 dword ptr [ebx + 0x1c], 0x40175a

        $sequence_8 = { e8???????? 53 e8???????? 8d5da8 }
            // n = 4, score = 100
            //   e8????????           |                     
            //   53                   | push                ebx
            //   e8????????           |                     
            //   8d5da8               | lea                 ebx, dword ptr [ebp - 0x58]

        $sequence_9 = { 68???????? 57 ff7514 e8???????? ff7609 }
            // n = 5, score = 100
            //   68????????           |                     
            //   57                   | push                edi
            //   ff7514               | push                dword ptr [ebp + 0x14]
            //   e8????????           |                     
            //   ff7609               | push                dword ptr [esi + 9]

    condition:
        7 of them and filesize < 49152
}
[TLP:WHITE] win_alice_atm_w0   (20200113 | Detects of ATM Malware ALICE)
rule win_alice_atm_w0 {
	meta:
		description = "Detects of ATM Malware ALICE"
		author = "Frank Boldewin (@r3c0nst)"
		reference = "https://twitter.com/r3c0nst/status/1215265889844637696"
		date = "2020-01-09"
		hash = "6b2fac8331e4b3e108aa829b297347f686ade233b24d94d881dc4eff81b9eb30"
		source = "https://raw.githubusercontent.com/fboldewin/YARA-rules/master/ATM.Malware.ALICE.yar"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm"
        malpedia_version = "20200113"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
		
	strings:
		$String1 = "Project Alice" ascii nocase
		$String2 = "Can't dispense requested amount." ascii nocase
		$String3 = "Selected cassette is unavailable" ascii nocase
		$String4 = "ATM update manager" wide nocase
		$String5 = "Input PIN-code for access" wide nocase
		$String6 = "Supervisor ID" wide nocase
		$Code1 = {50 68 08 07 00 00 6A 00 FF 75 0C FF 75 08 E8} // Get Cash Unit Info
		$Code2 = {50 6A 00 FF 75 10 FF 75 0C FF 75 08 E8} // Dispense Cash
		$Code3 = {68 ?? ?? ?? ?? 53 E8 ?? ?? ?? ?? 0B C0 75 29 6A} // Check Supervisor ID
		
	condition:
		uint16(0) == 0x5A4D and filesize < 200KB and 4 of ($String*) and all of ($Code*)
}
Download all Yara Rules