Is "Battle Tank Games" on Firefox Add-ons Safe to Install?

mr_JSm1th · firefox · v1.0.0.9resigned1

The process of playing Battle Tanks is simple and fascinating. A player in Battle Tank controls his tank with arrows, destroying enemy tanks that gradually appears on the playing field. The enemy's goal is to destroy the player's base in the form of an eagle, which is hidden behind a brick wall. The player's goal is to destroy the opponents and move to the next level. You need to destroy 20 units of enemy tanks of different types on each level. The game will be over if the enemy manages to destroy the base or deprive the player of lives. There are the following obstacles in the Battle Tank game: reducing the visibility and control of the tank, blocking the movement, destroyed by a shot of the tank. Bonuses randomly appear on the battlefield of the game Battle Tank, after the impact of enemy tanks. There are different types of bonuses in the game. For example, the bonus "scapula" temporarily creates a brick wall of a concrete stuff. The bonus "helmet" makes the tank invulnerable. The bonus "clock" for a while freezes the enemies, the bonus "grenade" undermines the enemy tanks located on the playing field. Also, there is a chance to meet a bonus that gives the player an extra life.

Risk Assessment

Analyzed
41.88
out of 100
MEDIUM

204 security findings detected across all analyzers

Severity Breakdown

0
Critical
35
High
169
Medium
0
Low
0
Info

Finding Categories

35
Malware Signatures
169
IoC Indicators

YARA Rules Matched

8 rules(35 hits)
postinstall file manipulation NoUseWeakRandom postinstall network communication postinstall obfuscation SQLInjection postinstall system command postinstall crypto operations LocalStorageShouldNotBeUsed

About This Extension

The process of playing Battle Tanks is simple and fascinating. A player in Battle Tank controls his tank with arrows, destroying enemy tanks that gradually appears on the playing field. The enemy's goal is to destroy the player's base in the form of an eagle, which is hidden behind a brick wall. The player's goal is to destroy the opponents and move to the next level. You need to destroy 20 units of enemy tanks of different types on each level. The game will be over if the enemy manages to destroy the base or deprive the player of lives. There are the following obstacles in the Battle Tank game: reducing the visibility and control of the tank, blocking the movement, destroyed by a shot of the tank. Bonuses randomly appear on the battlefield of the game Battle Tank, after the impact of enemy tanks. There are different types of bonuses in the game. For example, the bonus "scapula" temporarily creates a brick wall of a concrete stuff. The bonus "helmet" makes the tank invulnerable. The bonus "clock" for a while freezes the enemies, the bonus "grenade" undermines the enemy tanks located on the playing field. Also, there is a chance to meet a bonus that gives the player an extra life.

Detailed Findings

35 total

YARA Rule Matches

8 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
11
IP Addresses
3
Domains
146
Strings
169

All Indicators · 169

Domain
detected Domain: o.global

XIOC detected Domain: o.global

extracted_from_files

Domain
detected Domain: tabb4c328fa1d73604352c95515f8bf91.364d7dfe5a649121767617f2db4557f7.addons.mozilla.org

XIOC detected Domain: tabb4c328fa1d73604352c95515f8bf91.364d7dfe5a649121767617f2db4557f7.addons.mozilla.org

extracted_from_files

Hash
detected MD5 Hash: 526331E3B05B11E1A5C8E5D7C2EE8D46

XIOC detected MD5 Hash: 526331E3B05B11E1A5C8E5D7C2EE8D46

extracted_from_files

Hash
detected MD5 Hash: 526331E2B05B11E1A5C8E5D7C2EE8D46

XIOC detected MD5 Hash: 526331E2B05B11E1A5C8E5D7C2EE8D46

extracted_from_files

Hash
detected MD5 Hash: 526331E7B05B11E1A5C8E5D7C2EE8D46

XIOC detected MD5 Hash: 526331E7B05B11E1A5C8E5D7C2EE8D46

extracted_from_files

Hash
detected MD5 Hash: 526331E6B05B11E1A5C8E5D7C2EE8D46

XIOC detected MD5 Hash: 526331E6B05B11E1A5C8E5D7C2EE8D46

extracted_from_files

Hash
detected MD5 Hash: 525DB391B05B11E1A5C8E5D7C2EE8D46

XIOC detected MD5 Hash: 525DB391B05B11E1A5C8E5D7C2EE8D46

extracted_from_files

Hash
detected MD5 Hash: 525DB390B05B11E1A5C8E5D7C2EE8D46

XIOC detected MD5 Hash: 525DB390B05B11E1A5C8E5D7C2EE8D46

extracted_from_files

URL
detected URL: http://ns.adobe.com/tiff/1.0/

XIOC detected URL: http://ns.adobe.com/tiff/1.0/

extracted_from_files

URL
detected URL: http://mrdoob.com/

XIOC detected URL: http://mrdoob.com/

extracted_from_files

URL
detected URL: http://promo-newtab.club/?cid=ntpromo_tanchiki&ext='

XIOC detected URL: http://promo-newtab.club/?cid=ntpromo_tanchiki&ext='

extracted_from_files

URL
detected URL: http://promo-newtab.club/?source_type=uninstall&cid=ntpromo_tanchiki&ext='

XIOC detected URL: http://promo-newtab.club/?source_type=uninstall&cid=ntpromo_tanchiki&ext='

extracted_from_files

Hash
detected MD5 Hash: 364d7dfe5a649121767617f2db4557f7

XIOC detected MD5 Hash: 364d7dfe5a649121767617f2db4557f7

extracted_from_files

Hash
detected MD5 Hash: 525DB395B05B11E1A5C8E5D7C2EE8D46

XIOC detected MD5 Hash: 525DB395B05B11E1A5C8E5D7C2EE8D46

extracted_from_files

Hash
detected MD5 Hash: 525DB394B05B11E1A5C8E5D7C2EE8D46

XIOC detected MD5 Hash: 525DB394B05B11E1A5C8E5D7C2EE8D46

extracted_from_files

URL
detected URL: http://www.w3.org/TR/html4/loose.dtd

XIOC detected URL: http://www.w3.org/TR/html4/loose.dtd

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: http://www.high-logic.com/

XIOC detected URL: http://www.high-logic.com/

extracted_from_files

URL
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/mm/

XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/

XIOC detected URL: http://ns.adobe.com/xap/1.0/

extracted_from_files

Domain
detected Domain: powertankpoints.show

XIOC detected Domain: powertankpoints.show

extracted_from_files

Domain
detected Domain: armortankpoints.show

XIOC detected Domain: armortankpoints.show

extracted_from_files

Domain
detected Domain: tankstatenormal.call

XIOC detected Domain: tankstatenormal.call

extracted_from_files

Domain
detected Domain: tankstatenormal.prototype.update.call

XIOC detected Domain: tankstatenormal.prototype.update.call

extracted_from_files

Domain
detected Domain: tankstatenormal.prototype.draw.call

XIOC detected Domain: tankstatenormal.prototype.draw.call

extracted_from_files

Domain
detected Domain: promo-newtab.club

XIOC detected Domain: promo-newtab.club

extracted_from_files

Domain
detected Domain: info.name

XIOC detected Domain: info.name

extracted_from_files

Domain
detected Domain: poweruphandler.event.star

XIOC detected Domain: poweruphandler.event.star

extracted_from_files

Domain
detected Domain: powerup.type.star

XIOC detected Domain: powerup.type.star

extracted_from_files

Domain
detected Domain: point.call

XIOC detected Domain: point.call

extracted_from_files

Domain
detected Domain: stagemessage.prototype.show

XIOC detected Domain: stagemessage.prototype.show

extracted_from_files

Domain
detected Domain: stagestatisticspoints.prototype.show

XIOC detected Domain: stagestatisticspoints.prototype.show

extracted_from_files

Domain
detected Domain: basictankpoints.show

XIOC detected Domain: basictankpoints.show

extracted_from_files

Domain
detected Domain: fasttankpoints.show

XIOC detected Domain: fasttankpoints.show

extracted_from_files

Domain
detected Domain: level.show

XIOC detected Domain: level.show

extracted_from_files

Domain
detected Domain: rect.call

XIOC detected Domain: rect.call

extracted_from_files

Domain
detected Domain: keyboard.key.select

XIOC detected Domain: keyboard.key.select

extracted_from_files

Domain
detected Domain: gamefield.prototype.update.call

XIOC detected Domain: gamefield.prototype.update.call

extracted_from_files

Domain
detected Domain: gamefield.prototype.draw.call

XIOC detected Domain: gamefield.prototype.draw.call

extracted_from_files

Domain
detected Domain: level.prototype.show

XIOC detected Domain: level.prototype.show

extracted_from_files

Domain
detected Domain: stage.map

XIOC detected Domain: stage.map

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: keyboard.key.space

XIOC detected Domain: keyboard.key.space

extracted_from_files

Domain
detected Domain: sprite.build

XIOC detected Domain: sprite.build

extracted_from_files

Domain
detected Domain: spritecontroller.prototype.keyreleased.call

XIOC detected Domain: spritecontroller.prototype.keyreleased.call

extracted_from_files

Domain
detected Domain: tank.type.fast

XIOC detected Domain: tank.type.fast

extracted_from_files

Domain
detected Domain: stats.domelement.style.top

XIOC detected Domain: stats.domelement.style.top

extracted_from_files

Domain
detected Domain: stagemessage.show

XIOC detected Domain: stagemessage.show

extracted_from_files

Domain
detected Domain: mainmenuitem.call

XIOC detected Domain: mainmenuitem.call

extracted_from_files

Domain
detected Domain: sprite.prototype.tonormalspeed.call

XIOC detected Domain: sprite.prototype.tonormalspeed.call

extracted_from_files

Domain
detected Domain: cursor.prototype.build

XIOC detected Domain: cursor.prototype.build

extracted_from_files

Domain
detected Domain: sprite.prototype.move.call

XIOC detected Domain: sprite.prototype.move.call

extracted_from_files

Domain
detected Domain: spritecontroller.call

XIOC detected Domain: spritecontroller.call

extracted_from_files

Domain
detected Domain: spritecontroller.prototype.notify.call

XIOC detected Domain: spritecontroller.prototype.notify.call

extracted_from_files

Domain
detected Domain: event.cursor.build

XIOC detected Domain: event.cursor.build

extracted_from_files

Domain
detected Domain: wall.call

XIOC detected Domain: wall.call

extracted_from_files

Domain
detected Domain: cursor.event.build

XIOC detected Domain: cursor.event.build

extracted_from_files

Domain
detected Domain: this.build

XIOC detected Domain: this.build

extracted_from_files

Domain
detected Domain: builder.prototype.build

XIOC detected Domain: builder.prototype.build

extracted_from_files

Domain
detected Domain: bullet.speed.fast

XIOC detected Domain: bullet.speed.fast

extracted_from_files

Domain
detected Domain: spritecontainer.prototype.notify.call

XIOC detected Domain: spritecontainer.prototype.notify.call

extracted_from_files

Domain
detected Domain: gamefield.call

XIOC detected Domain: gamefield.call

extracted_from_files

Domain
detected Domain: b.using.call

XIOC detected Domain: b.using.call

extracted_from_files

IP
detected Domain: xiph.org

XIOC detected Domain: xiph.org

extracted_from_files

Domain
detected Domain: дx4.gh

XIOC detected Domain: дx4.gh

extracted_from_files

Domain
detected Domain: event.name

XIOC detected Domain: event.name

extracted_from_files

Domain
detected Domain: sprite.call

XIOC detected Domain: sprite.call

extracted_from_files

Domain
detected Domain: explosion.call

XIOC detected Domain: explosion.call

extracted_from_files

Domain
detected Domain: soundmanager.play

XIOC detected Domain: soundmanager.play

extracted_from_files

Domain
detected Domain: o.beforesend.call

XIOC detected Domain: o.beforesend.call

extracted_from_files

Domain
detected Domain: y.fail

XIOC detected Domain: y.fail

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: h.open

XIOC detected Domain: h.open

extracted_from_files

Domain
detected Domain: d.top

XIOC detected Domain: d.top

extracted_from_files

Domain
detected Domain: m.top

XIOC detected Domain: m.top

extracted_from_files

Domain
detected Domain: b.top-h.top

XIOC detected Domain: b.top-h.top

extracted_from_files

Domain
detected Domain: finish.call

XIOC detected Domain: finish.call

extracted_from_files

Domain
detected Domain: b.target

XIOC detected Domain: b.target

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: ib.host

XIOC detected Domain: ib.host

extracted_from_files

Domain
detected Domain: j.host

XIOC detected Domain: j.host

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Hash
detected MD5 Hash: 98F806532FB0E111A35A9FCCF4315A4F

XIOC detected MD5 Hash: 98F806532FB0E111A35A9FCCF4315A4F

extracted_from_files

Domain
detected Domain: g.empty.fire

XIOC detected Domain: g.empty.fire

extracted_from_files

Domain
detected Domain: j.opts.start.call

XIOC detected Domain: j.opts.start.call

extracted_from_files

Domain
detected Domain: j.opts.fail

XIOC detected Domain: j.opts.fail

extracted_from_files

Domain
detected Domain: r.fx.off

XIOC detected Domain: r.fx.off

extracted_from_files

Domain
detected Domain: e.old.call

XIOC detected Domain: e.old.call

extracted_from_files

Domain
detected Domain: e.stop.call

XIOC detected Domain: e.stop.call

extracted_from_files

Domain
detected Domain: b.events

XIOC detected Domain: b.events

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: b.top

XIOC detected Domain: b.top

extracted_from_files

Domain
detected Domain: i.style

XIOC detected Domain: i.style

extracted_from_files

Domain
detected Domain: this.now

XIOC detected Domain: this.now

extracted_from_files

Domain
detected Domain: this.options.step.call

XIOC detected Domain: this.options.step.call

extracted_from_files

Domain
detected Domain: a.elem.style

XIOC detected Domain: a.elem.style

extracted_from_files

Domain
detected Domain: this.click

XIOC detected Domain: this.click

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: r.now

XIOC detected Domain: r.now

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: f.events

XIOC detected Domain: f.events

extracted_from_files

Domain
detected Domain: g.events

XIOC detected Domain: g.events

extracted_from_files

Domain
detected Domain: q.call

XIOC detected Domain: q.call

extracted_from_files

Domain
detected Domain: l.teardown.call

XIOC detected Domain: l.teardown.call

extracted_from_files

Domain
detected Domain: k.predispatch.call

XIOC detected Domain: k.predispatch.call

extracted_from_files

Domain
detected Domain: r.event.handlers.call

XIOC detected Domain: r.event.handlers.call

extracted_from_files

Domain
detected Domain: b.data

XIOC detected Domain: b.data

extracted_from_files

Domain
detected Domain: g.data

XIOC detected Domain: g.data

extracted_from_files

Domain
detected Domain: k.postdispatch.call

XIOC detected Domain: k.postdispatch.call

extracted_from_files

Domain
detected Domain: a.target

XIOC detected Domain: a.target

extracted_from_files

Domain
detected Domain: ka.th

XIOC detected Domain: ka.th

extracted_from_files

Domain
detected Domain: ka.td

XIOC detected Domain: ka.td

extracted_from_files

Domain
detected Domain: q.events

XIOC detected Domain: q.events

extracted_from_files

Domain
detected Domain: l.setup.call

XIOC detected Domain: l.setup.call

extracted_from_files

Domain
detected Domain: l.add.call

XIOC detected Domain: l.add.call

extracted_from_files

Domain
detected Domain: r.event.global

XIOC detected Domain: r.event.global

extracted_from_files

Domain
detected Domain: l.remove.call

XIOC detected Domain: l.remove.call

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: b.map

XIOC detected Domain: b.map

extracted_from_files

Domain
detected Domain: f.empty.fire

XIOC detected Domain: f.empty.fire

extracted_from_files

Domain
detected Domain: a.style

XIOC detected Domain: a.style

extracted_from_files

Domain
detected Domain: r.style

XIOC detected Domain: r.style

extracted_from_files

Domain
detected Domain: d.style

XIOC detected Domain: d.style

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: a.now

XIOC detected Domain: a.now

extracted_from_files

Domain
detected Domain: b.id

XIOC detected Domain: b.id

extracted_from_files

Domain
detected Domain: b.next

XIOC detected Domain: b.next

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: ga.select

XIOC detected Domain: ga.select

extracted_from_files

Domain
detected Domain: d.call

XIOC detected Domain: d.call

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: j.id

XIOC detected Domain: j.id

extracted_from_files

Domain
detected Domain: ga.support

XIOC detected Domain: ga.support

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: d.find.id

XIOC detected Domain: d.find.id

extracted_from_files

Domain
detected Domain: d.filter.id

XIOC detected Domain: d.filter.id

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: f.call

XIOC detected Domain: f.call

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: k.call

XIOC detected Domain: k.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: h.call

XIOC detected Domain: h.call

extracted_from_files

Domain
detected Domain: fpstext.id

XIOC detected Domain: fpstext.id

extracted_from_files

Domain
detected Domain: fpsgraph.id

XIOC detected Domain: fpsgraph.id

extracted_from_files

Domain
detected Domain: msdiv.id

XIOC detected Domain: msdiv.id

extracted_from_files

Domain
detected Domain: mstext.id

XIOC detected Domain: mstext.id

extracted_from_files

Domain
detected Domain: msgraph.id

XIOC detected Domain: msgraph.id

extracted_from_files

Domain
detected Domain: jquery.org

XIOC detected Domain: jquery.org

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: www.high-logic.com

XIOC detected Domain: www.high-logic.com

extracted_from_files

Domain
detected Domain: www.inkscape.org

XIOC detected Domain: www.inkscape.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

Domain
detected Domain: mrdoob.com

XIOC detected Domain: mrdoob.com

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: container.id

XIOC detected Domain: container.id

extracted_from_files

Domain
detected Domain: fpsdiv.id

XIOC detected Domain: fpsdiv.id

extracted_from_files

IP
detected IP: 1.0.0.9

XIOC detected IP: 1.0.0.9

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: spritecontroller.prototype.keypressed.call

XIOC detected Domain: spritecontroller.prototype.keypressed.call

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Battle Tank Games is a Firefox Add-ons extension published by mr_JSm1th. Version 1.0.0.9resigned1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 41.88/100 (MEDIUM risk) based on 204 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 35 finding(s)
  • Medium: 169 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Battle Tank Games is published by mr_JSm1th on the Firefox Add-ons marketplace. The extension has approximately 471 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions