SYMBOLCOMMON_NAMEaka. SYNONYMS
win.alice_atm (Back to overview)

Project Alice

aka: PrAlice, AliceATM

There is no description at this point.

References
2019-05-30Talos IntelligenceVanja Svajcer
@online{svajcer:20190530:10:82553e1, author = {Vanja Svajcer}, title = {{10 years of virtual dynamite: A high-level retrospective of ATM malware}}, date = {2019-05-30}, organization = {Talos Intelligence}, url = {https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html}, language = {English}, urldate = {2019-11-24} } 10 years of virtual dynamite: A high-level retrospective of ATM malware
FastCash Project Alice Cutlet Ploutus ATM Skimer Tyupkin
2018-03-30Trend MicroDavid Sancho, Numaan Huq, Massimiliano Michenz
@techreport{sancho:20180330:cashing:b325dd3, author = {David Sancho and Numaan Huq and Massimiliano Michenz}, title = {{Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types}}, date = {2018-03-30}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf}, language = {English}, urldate = {2020-02-27} } Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2016-12-20Trend MicroDavid Sancho, Numaan Huq
@online{sancho:20161220:alice:048e628, author = {David Sancho and Numaan Huq}, title = {{Alice: A Lightweight, Compact, No-Nonsense ATM Malware}}, date = {2016-12-20}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/alice-lightweight-compact-no-nonsense-atm-malware/}, language = {English}, urldate = {2020-01-09} } Alice: A Lightweight, Compact, No-Nonsense ATM Malware
Project Alice
Yara Rules
[TLP:WHITE] win_alice_atm_auto (20201023 | autogenerated rule brought to you by yara-signator)
rule win_alice_atm_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-12-22"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm"
        malpedia_rule_date = "20201222"
        malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130"
        malpedia_version = "20201023"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 6a05 53 ff5304 83c41c ff75f4 68???????? }
            // n = 6, score = 100
            //   6a05                 | push                5
            //   53                   | push                ebx
            //   ff5304               | call                dword ptr [ebx + 4]
            //   83c41c               | add                 esp, 0x1c
            //   ff75f4               | push                dword ptr [ebp - 0xc]
            //   68????????           |                     

        $sequence_1 = { ff7608 68???????? 8d45e0 50 e8???????? 83c40c 8b4e04 }
            // n = 7, score = 100
            //   ff7608               | push                dword ptr [esi + 8]
            //   68????????           |                     
            //   8d45e0               | lea                 eax, [ebp - 0x20]
            //   50                   | push                eax
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   8b4e04               | mov                 ecx, dword ptr [esi + 4]

        $sequence_2 = { 0f85b7000000 e8???????? ff7508 8f05???????? 68ea030000 }
            // n = 5, score = 100
            //   0f85b7000000         | jne                 0xbd
            //   e8????????           |                     
            //   ff7508               | push                dword ptr [ebp + 8]
            //   8f05????????         |                     
            //   68ea030000           | push                0x3ea

        $sequence_3 = { 33ff 897dfc 8d9deefdffff 8db5e8fbffff 57 }
            // n = 5, score = 100
            //   33ff                 | xor                 edi, edi
            //   897dfc               | mov                 dword ptr [ebp - 4], edi
            //   8d9deefdffff         | lea                 ebx, [ebp - 0x212]
            //   8db5e8fbffff         | lea                 esi, [ebp - 0x418]
            //   57                   | push                edi

        $sequence_4 = { 5e 5b c9 c21400 55 8bec 83c4f8 }
            // n = 7, score = 100
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx
            //   c9                   | leave               
            //   c21400               | ret                 0x14
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   83c4f8               | add                 esp, -8

        $sequence_5 = { 68ec030000 ff7508 e8???????? 8bf0 }
            // n = 4, score = 100
            //   68ec030000           | push                0x3ec
            //   ff7508               | push                dword ptr [ebp + 8]
            //   e8????????           |                     
            //   8bf0                 | mov                 esi, eax

        $sequence_6 = { 55 8bec 81c4f4fdffff 53 56 57 33ff }
            // n = 7, score = 100
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   81c4f4fdffff         | add                 esp, 0xfffffdf4
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi
            //   33ff                 | xor                 edi, edi

        $sequence_7 = { 33c0 8945fc 8b5d08 0bdb 7414 6a00 6a00 }
            // n = 7, score = 100
            //   33c0                 | xor                 eax, eax
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8b5d08               | mov                 ebx, dword ptr [ebp + 8]
            //   0bdb                 | or                  ebx, ebx
            //   7414                 | je                  0x16
            //   6a00                 | push                0
            //   6a00                 | push                0

        $sequence_8 = { ff7320 e8???????? 8945fc 8b45fc 5f 5e 5b }
            // n = 7, score = 100
            //   ff7320               | push                dword ptr [ebx + 0x20]
            //   e8????????           |                     
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx

        $sequence_9 = { 68???????? 53 ff13 ff35???????? 68ec030000 ff7508 }
            // n = 6, score = 100
            //   68????????           |                     
            //   53                   | push                ebx
            //   ff13                 | call                dword ptr [ebx]
            //   ff35????????         |                     
            //   68ec030000           | push                0x3ec
            //   ff7508               | push                dword ptr [ebp + 8]

    condition:
        7 of them and filesize < 49152
}
[TLP:WHITE] win_alice_atm_w0   (20200113 | Detects of ATM Malware ALICE)
rule win_alice_atm_w0 {
	meta:
		description = "Detects of ATM Malware ALICE"
		author = "Frank Boldewin (@r3c0nst)"
		reference = "https://twitter.com/r3c0nst/status/1215265889844637696"
		date = "2020-01-09"
		hash = "6b2fac8331e4b3e108aa829b297347f686ade233b24d94d881dc4eff81b9eb30"
		source = "https://raw.githubusercontent.com/fboldewin/YARA-rules/master/ATM.Malware.ALICE.yar"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm"
        malpedia_version = "20200113"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
		
	strings:
		$String1 = "Project Alice" ascii nocase
		$String2 = "Can't dispense requested amount." ascii nocase
		$String3 = "Selected cassette is unavailable" ascii nocase
		$String4 = "ATM update manager" wide nocase
		$String5 = "Input PIN-code for access" wide nocase
		$String6 = "Supervisor ID" wide nocase
		$Code1 = {50 68 08 07 00 00 6A 00 FF 75 0C FF 75 08 E8} // Get Cash Unit Info
		$Code2 = {50 6A 00 FF 75 10 FF 75 0C FF 75 08 E8} // Dispense Cash
		$Code3 = {68 ?? ?? ?? ?? 53 E8 ?? ?? ?? ?? 0B C0 75 29 6A} // Check Supervisor ID
		
	condition:
		uint16(0) == 0x5A4D and filesize < 200KB and 4 of ($String*) and all of ($Code*)
}
Download all Yara Rules