SYMBOLCOMMON_NAMEaka. SYNONYMS
win.alice_atm (Back to overview)

Project Alice

aka: PrAlice, AliceATM

There is no description at this point.

References
2019-05-30Talos IntelligenceVanja Svajcer
@online{svajcer:20190530:10:82553e1, author = {Vanja Svajcer}, title = {{10 years of virtual dynamite: A high-level retrospective of ATM malware}}, date = {2019-05-30}, organization = {Talos Intelligence}, url = {https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html}, language = {English}, urldate = {2019-11-24} } 10 years of virtual dynamite: A high-level retrospective of ATM malware
FastCash Project Alice Cutlet Ploutus ATM Skimer Tyupkin
2018-03-30Trend MicroDavid Sancho, Numaan Huq, Massimiliano Michenz
@techreport{sancho:20180330:cashing:b325dd3, author = {David Sancho and Numaan Huq and Massimiliano Michenz}, title = {{Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types}}, date = {2018-03-30}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf}, language = {English}, urldate = {2020-02-27} } Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2016-12-20Trend MicroDavid Sancho, Numaan Huq
@online{sancho:20161220:alice:048e628, author = {David Sancho and Numaan Huq}, title = {{Alice: A Lightweight, Compact, No-Nonsense ATM Malware}}, date = {2016-12-20}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/alice-lightweight-compact-no-nonsense-atm-malware/}, language = {English}, urldate = {2020-01-09} } Alice: A Lightweight, Compact, No-Nonsense ATM Malware
Project Alice
Yara Rules
[TLP:WHITE] win_alice_atm_auto (20211008 | Detects win.alice_atm.)
rule win_alice_atm_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2021-10-07"
        version = "1"
        description = "Detects win.alice_atm."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm"
        malpedia_rule_date = "20211007"
        malpedia_hash = "e5b790e0f888f252d49063a1251ca60ec2832535"
        malpedia_version = "20211008"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 0bdb 746f 682f010000 ff7310 e8???????? }
            // n = 5, score = 100
            //   0bdb                 | or                  ebx, ebx
            //   746f                 | je                  0x71
            //   682f010000           | push                0x12f
            //   ff7310               | push                dword ptr [ebx + 0x10]
            //   e8????????           |                     

        $sequence_1 = { 33c0 8945fc 8b45fc 5f 5e 5b c9 }
            // n = 7, score = 100
            //   33c0                 | xor                 eax, eax
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx
            //   c9                   | leave               

        $sequence_2 = { ff5310 8b7510 56 e8???????? 0bc0 0f841b010000 }
            // n = 6, score = 100
            //   ff5310               | call                dword ptr [ebx + 0x10]
            //   8b7510               | mov                 esi, dword ptr [ebp + 0x10]
            //   56                   | push                esi
            //   e8????????           |                     
            //   0bc0                 | or                  eax, eax
            //   0f841b010000         | je                  0x121

        $sequence_3 = { 0bdb 7414 6a00 6a00 6804100000 ff7320 }
            // n = 6, score = 100
            //   0bdb                 | or                  ebx, ebx
            //   7414                 | je                  0x16
            //   6a00                 | push                0
            //   6a00                 | push                0
            //   6804100000           | push                0x1004
            //   ff7320               | push                dword ptr [ebx + 0x20]

        $sequence_4 = { 53 56 57 33c0 8945fc ff7508 e8???????? }
            // n = 7, score = 100
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi
            //   33c0                 | xor                 eax, eax
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   ff7508               | push                dword ptr [ebp + 8]
            //   e8????????           |                     

        $sequence_5 = { 740e ff7510 ff7514 ff75fc e8???????? 397d18 }
            // n = 6, score = 100
            //   740e                 | je                  0x10
            //   ff7510               | push                dword ptr [ebp + 0x10]
            //   ff7514               | push                dword ptr [ebp + 0x14]
            //   ff75fc               | push                dword ptr [ebp - 4]
            //   e8????????           |                     
            //   397d18               | cmp                 dword ptr [ebp + 0x18], edi

        $sequence_6 = { 0bdb 7414 6a00 6a00 6804100000 ff7320 e8???????? }
            // n = 7, score = 100
            //   0bdb                 | or                  ebx, ebx
            //   7414                 | je                  0x16
            //   6a00                 | push                0
            //   6a00                 | push                0
            //   6804100000           | push                0x1004
            //   ff7320               | push                dword ptr [ebx + 0x20]
            //   e8????????           |                     

        $sequence_7 = { 81c4f4fdffff 53 56 57 33ff }
            // n = 5, score = 100
            //   81c4f4fdffff         | add                 esp, 0xfffffdf4
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi
            //   33ff                 | xor                 edi, edi

        $sequence_8 = { e8???????? 891d???????? 68d5070000 ff7508 e8???????? }
            // n = 5, score = 100
            //   e8????????           |                     
            //   891d????????         |                     
            //   68d5070000           | push                0x7d5
            //   ff7508               | push                dword ptr [ebp + 8]
            //   e8????????           |                     

        $sequence_9 = { ff15???????? 0bc0 742a 8bd8 }
            // n = 4, score = 100
            //   ff15????????         |                     
            //   0bc0                 | or                  eax, eax
            //   742a                 | je                  0x2c
            //   8bd8                 | mov                 ebx, eax

    condition:
        7 of them and filesize < 49152
}
[TLP:WHITE] win_alice_atm_w0   (20200113 | Detects of ATM Malware ALICE)
rule win_alice_atm_w0 {
	meta:
		description = "Detects of ATM Malware ALICE"
		author = "Frank Boldewin (@r3c0nst)"
		reference = "https://twitter.com/r3c0nst/status/1215265889844637696"
		date = "2020-01-09"
		hash = "6b2fac8331e4b3e108aa829b297347f686ade233b24d94d881dc4eff81b9eb30"
		source = "https://raw.githubusercontent.com/fboldewin/YARA-rules/master/ATM.Malware.ALICE.yar"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm"
        malpedia_version = "20200113"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
		
	strings:
		$String1 = "Project Alice" ascii nocase
		$String2 = "Can't dispense requested amount." ascii nocase
		$String3 = "Selected cassette is unavailable" ascii nocase
		$String4 = "ATM update manager" wide nocase
		$String5 = "Input PIN-code for access" wide nocase
		$String6 = "Supervisor ID" wide nocase
		$Code1 = {50 68 08 07 00 00 6A 00 FF 75 0C FF 75 08 E8} // Get Cash Unit Info
		$Code2 = {50 6A 00 FF 75 10 FF 75 0C FF 75 08 E8} // Dispense Cash
		$Code3 = {68 ?? ?? ?? ?? 53 E8 ?? ?? ?? ?? 0B C0 75 29 6A} // Check Supervisor ID
		
	condition:
		uint16(0) == 0x5A4D and filesize < 200KB and 4 of ($String*) and all of ($Code*)
}
Download all Yara Rules