Is "Flappy Bird" on Firefox Add-ons Safe to Install?

mr_JSm1th · firefox · v1.0.0.10resigned1

Play the popular game Flappy Bird in Popup. Just click the icon on your Chrome browser and have fun! Flappy Bird is the most popular game on the Internet these days. It’s a simple game in which you have to navigate like a bird and past the obstacles. Each time when you click a button, the bird flies up. Don't make it fly too high because you may crush the bird. That means you need tap the button at the right moments to make the flight as long as possible!

Risk Assessment

Analyzed
41.55
out of 100
MEDIUM

156 security findings detected across all analyzers

Severity Breakdown

0
Critical
12
High
144
Medium
0
Low
0
Info

Finding Categories

12
Malware Signatures
143
IoC Indicators

YARA Rules Matched

7 rules(12 hits)
postinstall network communication postinstall obfuscation SQLInjection postinstall file manipulation postinstall system command NoUseWeakRandom postinstall crypto operations

About This Extension

Play the popular game Flappy Bird in Popup. Just click the icon on your Chrome browser and have fun! Flappy Bird is the most popular game on the Internet these days. It’s a simple game in which you have to navigate like a bird and past the obstacles. Each time when you click a button, the bird flies up. Don't make it fly too high because you may crush the bird. That means you need tap the button at the right moments to make the flight as long as possible!

Detailed Findings

12 total

YARA Rule Matches

7 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
17
IP Addresses
4
Domains
116
Strings
143

All Indicators · 143

Domain
detected Domain: soundjump.play

XIOC detected Domain: soundjump.play

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Hash
detected MD5 Hash: C2FA08AFA793A82D25F763181C791C47

XIOC detected MD5 Hash: C2FA08AFA793A82D25F763181C791C47

extracted_from_files

Hash
detected MD5 Hash: EC3241E98192E7A90604E1B9F46E6816

XIOC detected MD5 Hash: EC3241E98192E7A90604E1B9F46E6816

extracted_from_files

URL
detected URL: http://promo-newtab.club/?source_type=uninstall&cid=ntpromo_flappy&ext='

XIOC detected URL: http://promo-newtab.club/?source_type=uninstall&cid=ntpromo_flappy&ext='

extracted_from_files

Hash
detected MD5 Hash: 1f24f9778868e1074f918fb37de6b719

XIOC detected MD5 Hash: 1f24f9778868e1074f918fb37de6b719

extracted_from_files

Hash
detected MD5 Hash: 03F066FE8793E3119D64CBAE8BAA8C74

XIOC detected MD5 Hash: 03F066FE8793E3119D64CBAE8BAA8C74

extracted_from_files

Hash
detected MD5 Hash: 19BD6D558893E3119D64CBAE8BAA8C74

XIOC detected MD5 Hash: 19BD6D558893E3119D64CBAE8BAA8C74

extracted_from_files

Hash
detected MD5 Hash: 4433C66DD1C7888AE5AF690CE3F43647

XIOC detected MD5 Hash: 4433C66DD1C7888AE5AF690CE3F43647

extracted_from_files

Hash
detected MD5 Hash: 5DF717BCA56F40EAF889833C5EC6A93F

XIOC detected MD5 Hash: 5DF717BCA56F40EAF889833C5EC6A93F

extracted_from_files

Hash
detected MD5 Hash: 809FB21D9893E3119D64CBAE8BAA8C74

XIOC detected MD5 Hash: 809FB21D9893E3119D64CBAE8BAA8C74

extracted_from_files

URL
detected URL: http://www.iec.ch

XIOC detected URL: http://www.iec.ch

extracted_from_files

URL
detected URL: http://ricostacruz.com/jquery.transit

XIOC detected URL: http://ricostacruz.com/jquery.transit

extracted_from_files

URL
detected URL: http://github.com/rstacruz/jquery.transit

XIOC detected URL: http://github.com/rstacruz/jquery.transit

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en/CSS/CSS_transitions#Properties_that_can_be_animated

XIOC detected URL: https://developer.mozilla.org/en/CSS/CSS_transitions#Properties_that_can_be_animated

extracted_from_files

URL
detected URL: http://api.jquery.com/jQuery.cssHooks/),

XIOC detected URL: http://api.jquery.com/jQuery.cssHooks/),

extracted_from_files

URL
detected URL: http://davidwalsh.name/detecting-google-chrome-javascript

XIOC detected URL: http://davidwalsh.name/detecting-google-chrome-javascript

extracted_from_files

URL
detected URL: http://promo-newtab.club/?cid=ntpromo_flappy&ext='

XIOC detected URL: http://promo-newtab.club/?cid=ntpromo_flappy&ext='

extracted_from_files

URL
detected URL: http://purl.org/dc/elements/1.1/

XIOC detected URL: http://purl.org/dc/elements/1.1/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/

XIOC detected URL: http://ns.adobe.com/xap/1.0/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/mm/

XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/

extracted_from_files

URL
detected URL: http://ns.adobe.com/tiff/1.0/

XIOC detected URL: http://ns.adobe.com/tiff/1.0/

extracted_from_files

URL
detected URL: http://ns.adobe.com/exif/1.0/

XIOC detected URL: http://ns.adobe.com/exif/1.0/

extracted_from_files

URL
detected URL: http://ns.adobe.com/photoshop/1.0/

XIOC detected URL: http://ns.adobe.com/photoshop/1.0/

extracted_from_files

Domain
detected Domain: soundscore.play

XIOC detected Domain: soundscore.play

extracted_from_files

Domain
detected Domain: upper.style

XIOC detected Domain: upper.style

extracted_from_files

Domain
detected Domain: lower.style

XIOC detected Domain: lower.style

extracted_from_files

Domain
detected Domain: isincompatible.android

XIOC detected Domain: isincompatible.android

extracted_from_files

Domain
detected Domain: isincompatible.windows

XIOC detected Domain: isincompatible.windows

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

extracted_from_files

Domain
detected Domain: sound.off

XIOC detected Domain: sound.off

extracted_from_files

Domain
detected Domain: window.location.search

XIOC detected Domain: window.location.search

extracted_from_files

Domain
detected Domain: soundswoosh.play

XIOC detected Domain: soundswoosh.play

extracted_from_files

Domain
detected Domain: box.top

XIOC detected Domain: box.top

extracted_from_files

Domain
detected Domain: d.find.id

XIOC detected Domain: d.find.id

extracted_from_files

Domain
detected Domain: soundhit.play

XIOC detected Domain: soundhit.play

extracted_from_files

Domain
detected Domain: sounddie.play

XIOC detected Domain: sounddie.play

extracted_from_files

Domain
detected Domain: davidwalsh.name

XIOC detected Domain: davidwalsh.name

extracted_from_files

Domain
detected Domain: div.style

XIOC detected Domain: div.style

extracted_from_files

Domain
detected Domain: elem.style

XIOC detected Domain: elem.style

extracted_from_files

Domain
detected Domain: fn.call

XIOC detected Domain: fn.call

extracted_from_files

Domain
detected Domain: this.style

XIOC detected Domain: this.style

extracted_from_files

Domain
detected Domain: promo-newtab.club

XIOC detected Domain: promo-newtab.club

extracted_from_files

Domain
detected Domain: info.name

XIOC detected Domain: info.name

extracted_from_files

Domain
detected Domain: m.top

XIOC detected Domain: m.top

extracted_from_files

Domain
detected Domain: b.top-h.top

XIOC detected Domain: b.top-h.top

extracted_from_files

Domain
detected Domain: b.using.call

XIOC detected Domain: b.using.call

extracted_from_files

Domain
detected Domain: ricostacruz.com

XIOC detected Domain: ricostacruz.com

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: developer.mozilla.org

XIOC detected Domain: developer.mozilla.org

extracted_from_files

Domain
detected Domain: api.jquery.com

XIOC detected Domain: api.jquery.com

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: o.global

XIOC detected Domain: o.global

extracted_from_files

Domain
detected Domain: o.beforesend.call

XIOC detected Domain: o.beforesend.call

extracted_from_files

Domain
detected Domain: y.fail

XIOC detected Domain: y.fail

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: h.open

XIOC detected Domain: h.open

extracted_from_files

Domain
detected Domain: d.top

XIOC detected Domain: d.top

extracted_from_files

Domain
detected Domain: d.old.call

XIOC detected Domain: d.old.call

extracted_from_files

Domain
detected Domain: e.stop.call

XIOC detected Domain: e.stop.call

extracted_from_files

Domain
detected Domain: finish.call

XIOC detected Domain: finish.call

extracted_from_files

Domain
detected Domain: b.target

XIOC detected Domain: b.target

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: lb.host

XIOC detected Domain: lb.host

extracted_from_files

Domain
detected Domain: j.host

XIOC detected Domain: j.host

extracted_from_files

Domain
detected Domain: this.options.step.call

XIOC detected Domain: this.options.step.call

extracted_from_files

Domain
detected Domain: a.elem.style

XIOC detected Domain: a.elem.style

extracted_from_files

Domain
detected Domain: a.now

XIOC detected Domain: a.now

extracted_from_files

Domain
detected Domain: g.empty.fire

XIOC detected Domain: g.empty.fire

extracted_from_files

Domain
detected Domain: j.opts.start.call

XIOC detected Domain: j.opts.start.call

extracted_from_files

Hash
detected MD5 Hash: 869FB21D9893E3119D64CBAE8BAA8C74

XIOC detected MD5 Hash: 869FB21D9893E3119D64CBAE8BAA8C74

extracted_from_files

Domain
detected Domain: r.fx.off

XIOC detected Domain: r.fx.off

extracted_from_files

Domain
detected Domain: g.events

XIOC detected Domain: g.events

extracted_from_files

Domain
detected Domain: q.call

XIOC detected Domain: q.call

extracted_from_files

Domain
detected Domain: b.events

XIOC detected Domain: b.events

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: b.top

XIOC detected Domain: b.top

extracted_from_files

Domain
detected Domain: i.style

XIOC detected Domain: i.style

extracted_from_files

Domain
detected Domain: this.now

XIOC detected Domain: this.now

extracted_from_files

Domain
detected Domain: k.postdispatch.call

XIOC detected Domain: k.postdispatch.call

extracted_from_files

Domain
detected Domain: a.target

XIOC detected Domain: a.target

extracted_from_files

Domain
detected Domain: this.click

XIOC detected Domain: this.click

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: r.now

XIOC detected Domain: r.now

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: f.events

XIOC detected Domain: f.events

extracted_from_files

Domain
detected Domain: r.event.global

XIOC detected Domain: r.event.global

extracted_from_files

Domain
detected Domain: l.remove.call

XIOC detected Domain: l.remove.call

extracted_from_files

Domain
detected Domain: l.teardown.call

XIOC detected Domain: l.teardown.call

extracted_from_files

Domain
detected Domain: k.predispatch.call

XIOC detected Domain: k.predispatch.call

extracted_from_files

Domain
detected Domain: r.event.handlers.call

XIOC detected Domain: r.event.handlers.call

extracted_from_files

Domain
detected Domain: b.data

XIOC detected Domain: b.data

extracted_from_files

Domain
detected Domain: g.data

XIOC detected Domain: g.data

extracted_from_files

Domain
detected Domain: d.style

XIOC detected Domain: d.style

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: ma.th

XIOC detected Domain: ma.th

extracted_from_files

Domain
detected Domain: ma.td

XIOC detected Domain: ma.td

extracted_from_files

Domain
detected Domain: q.events

XIOC detected Domain: q.events

extracted_from_files

Domain
detected Domain: l.setup.call

XIOC detected Domain: l.setup.call

extracted_from_files

Domain
detected Domain: l.add.call

XIOC detected Domain: l.add.call

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: d.call

XIOC detected Domain: d.call

extracted_from_files

Domain
detected Domain: b.map

XIOC detected Domain: b.map

extracted_from_files

Domain
detected Domain: f.empty.fire

XIOC detected Domain: f.empty.fire

extracted_from_files

Domain
detected Domain: a.style

XIOC detected Domain: a.style

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: b.id

XIOC detected Domain: b.id

extracted_from_files

Domain
detected Domain: b.next

XIOC detected Domain: b.next

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: ga.select

XIOC detected Domain: ga.select

extracted_from_files

Domain
detected Domain: h.call

XIOC detected Domain: h.call

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: j.id

XIOC detected Domain: j.id

extracted_from_files

Domain
detected Domain: ga.support

XIOC detected Domain: ga.support

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: d.filter.id

XIOC detected Domain: d.filter.id

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: f.call

XIOC detected Domain: f.call

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: k.call

XIOC detected Domain: k.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

URL
detected Domain: purl.org

XIOC detected Domain: purl.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

Domain
detected Domain: www.iec.ch

XIOC detected Domain: www.iec.ch

extracted_from_files

IP
detected Domain: xiph.org

XIOC detected Domain: xiph.org

extracted_from_files

Domain
detected Domain: t.ge

XIOC detected Domain: t.ge

extracted_from_files

Domain
detected Domain: f.bj

XIOC detected Domain: f.bj

extracted_from_files

Domain
detected Domain: jquery.org

XIOC detected Domain: jquery.org

extracted_from_files

IP
detected IP: 1.0.0.10

XIOC detected IP: 1.0.0.10

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: t1316372bcf35a95eff4e50a4ddb805ec.1f24f9778868e1074f918fb37de6b719.addons.mozilla.org

XIOC detected Domain: t1316372bcf35a95eff4e50a4ddb805ec.1f24f9778868e1074f918fb37de6b719.addons.mozilla.org

extracted_from_files

Domain
detected Domain: j.opts.fail

XIOC detected Domain: j.opts.fail

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Flappy Bird is a Firefox Add-ons extension published by mr_JSm1th. Version 1.0.0.10resigned1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 41.55/100 (MEDIUM risk) based on 156 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 12 finding(s)
  • Medium: 144 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Flappy Bird is published by mr_JSm1th on the Firefox Add-ons marketplace. The extension has approximately 982 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions