SYMBOLCOMMON_NAMEaka. SYNONYMS
win.alice_atm (Back to overview)

Project Alice

aka: PrAlice, AliceATM

There is no description at this point.

References
2019-05-30Talos IntelligenceVanja Svajcer
@online{svajcer:20190530:10:82553e1, author = {Vanja Svajcer}, title = {{10 years of virtual dynamite: A high-level retrospective of ATM malware}}, date = {2019-05-30}, organization = {Talos Intelligence}, url = {https://blog.talosintelligence.com/2019/05/10-years-of-virtual-dynamite.html}, language = {English}, urldate = {2019-11-24} } 10 years of virtual dynamite: A high-level retrospective of ATM malware
FastCash Project Alice Cutlet Ploutus ATM Skimer Tyupkin
2018-03-30Trend MicroDavid Sancho, Numaan Huq, Massimiliano Michenz
@techreport{sancho:20180330:cashing:b325dd3, author = {David Sancho and Numaan Huq and Massimiliano Michenz}, title = {{Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types}}, date = {2018-03-30}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/white_papers/wp-cashing-in-on-atm-malware.pdf}, language = {English}, urldate = {2020-02-27} } Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2016-12-20Trend MicroDavid Sancho, Numaan Huq
@online{sancho:20161220:alice:048e628, author = {David Sancho and Numaan Huq}, title = {{Alice: A Lightweight, Compact, No-Nonsense ATM Malware}}, date = {2016-12-20}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/alice-lightweight-compact-no-nonsense-atm-malware/}, language = {English}, urldate = {2020-01-09} } Alice: A Lightweight, Compact, No-Nonsense ATM Malware
Project Alice
Yara Rules
[TLP:WHITE] win_alice_atm_auto (20230715 | Detects win.alice_atm.)
rule win_alice_atm_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.alice_atm."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { eb1d 68???????? 53 e8???????? 0bc0 750e }
            // n = 6, score = 100
            //   eb1d                 | jmp                 0x1f
            //   68????????           |                     
            //   53                   | push                ebx
            //   e8????????           |                     
            //   0bc0                 | or                  eax, eax
            //   750e                 | jne                 0x10

        $sequence_1 = { 6a00 68???????? 6a00 68e8030000 ff35???????? e8???????? eb1d }
            // n = 7, score = 100
            //   6a00                 | push                0
            //   68????????           |                     
            //   6a00                 | push                0
            //   68e8030000           | push                0x3e8
            //   ff35????????         |                     
            //   e8????????           |                     
            //   eb1d                 | jmp                 0x1f

        $sequence_2 = { c74304???????? c74308???????? c7430ce3154000 c74310f7164000 c743142a174000 c7431842174000 }
            // n = 6, score = 100
            //   c74304????????       |                     
            //   c74308????????       |                     
            //   c7430ce3154000       | mov                 dword ptr [ebx + 0xc], 0x4015e3
            //   c74310f7164000       | mov                 dword ptr [ebx + 0x10], 0x4016f7
            //   c743142a174000       | mov                 dword ptr [ebx + 0x14], 0x40172a
            //   c7431842174000       | mov                 dword ptr [ebx + 0x18], 0x401742

        $sequence_3 = { 8b5d08 0bdb 7471 837d0c00 746b 8d7510 }
            // n = 6, score = 100
            //   8b5d08               | mov                 ebx, dword ptr [ebp + 8]
            //   0bdb                 | or                  ebx, ebx
            //   7471                 | je                  0x73
            //   837d0c00             | cmp                 dword ptr [ebp + 0xc], 0
            //   746b                 | je                  0x6d
            //   8d7510               | lea                 esi, [ebp + 0x10]

        $sequence_4 = { 53 e8???????? 0bc0 7510 6a00 }
            // n = 5, score = 100
            //   53                   | push                ebx
            //   e8????????           |                     
            //   0bc0                 | or                  eax, eax
            //   7510                 | jne                 0x12
            //   6a00                 | push                0

        $sequence_5 = { 8b7604 8b16 0fb70a 51 8f07 ff7218 8f4704 }
            // n = 7, score = 100
            //   8b7604               | mov                 esi, dword ptr [esi + 4]
            //   8b16                 | mov                 edx, dword ptr [esi]
            //   0fb70a               | movzx               ecx, word ptr [edx]
            //   51                   | push                ecx
            //   8f07                 | pop                 dword ptr [edi]
            //   ff7218               | push                dword ptr [edx + 0x18]
            //   8f4704               | pop                 dword ptr [edi + 4]

        $sequence_6 = { 6a28 57 e8???????? c745d401000000 53 ff5308 }
            // n = 6, score = 100
            //   6a28                 | push                0x28
            //   57                   | push                edi
            //   e8????????           |                     
            //   c745d401000000       | mov                 dword ptr [ebp - 0x2c], 1
            //   53                   | push                ebx
            //   ff5308               | call                dword ptr [ebx + 8]

        $sequence_7 = { 8d06 50 e8???????? 8b4df8 66894e07 c1e102 }
            // n = 6, score = 100
            //   8d06                 | lea                 eax, [esi]
            //   50                   | push                eax
            //   e8????????           |                     
            //   8b4df8               | mov                 ecx, dword ptr [ebp - 8]
            //   66894e07             | mov                 word ptr [esi + 7], cx
            //   c1e102               | shl                 ecx, 2

        $sequence_8 = { 6803000300 68???????? e8???????? 0bc0 }
            // n = 4, score = 100
            //   6803000300           | push                0x30003
            //   68????????           |                     
            //   e8????????           |                     
            //   0bc0                 | or                  eax, eax

        $sequence_9 = { 833d????????00 740b ff35???????? e8???????? 891d???????? 53 68ec030000 }
            // n = 7, score = 100
            //   833d????????00       |                     
            //   740b                 | je                  0xd
            //   ff35????????         |                     
            //   e8????????           |                     
            //   891d????????         |                     
            //   53                   | push                ebx
            //   68ec030000           | push                0x3ec

    condition:
        7 of them and filesize < 49152
}
[TLP:WHITE] win_alice_atm_w0   (20200113 | Detects of ATM Malware ALICE)
rule win_alice_atm_w0 {
	meta:
		description = "Detects of ATM Malware ALICE"
		author = "Frank Boldewin (@r3c0nst)"
		reference = "https://twitter.com/r3c0nst/status/1215265889844637696"
		date = "2020-01-09"
		hash = "6b2fac8331e4b3e108aa829b297347f686ade233b24d94d881dc4eff81b9eb30"
		source = "https://raw.githubusercontent.com/fboldewin/YARA-rules/master/ATM.Malware.ALICE.yar"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.alice_atm"
        malpedia_version = "20200113"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
		
	strings:
		$String1 = "Project Alice" ascii nocase
		$String2 = "Can't dispense requested amount." ascii nocase
		$String3 = "Selected cassette is unavailable" ascii nocase
		$String4 = "ATM update manager" wide nocase
		$String5 = "Input PIN-code for access" wide nocase
		$String6 = "Supervisor ID" wide nocase
		$Code1 = {50 68 08 07 00 00 6A 00 FF 75 0C FF 75 08 E8} // Get Cash Unit Info
		$Code2 = {50 6A 00 FF 75 10 FF 75 0C FF 75 08 E8} // Dispense Cash
		$Code3 = {68 ?? ?? ?? ?? 53 E8 ?? ?? ?? ?? 0B C0 75 29 6A} // Check Supervisor ID
		
	condition:
		uint16(0) == 0x5A4D and filesize < 200KB and 4 of ($String*) and all of ($Code*)
}
Download all Yara Rules