Is "Pool" on Firefox Add-ons Safe to Install?

mr_JSm1th · firefox · v1.0.0.10resigned1

Play Pool billiards and have fun. You have an opportunity to try yourself as a professional player. If you don't know how to play billiards, it's time to learn. The principle of entertainment is simple enough. There are cue and colorful balls in the game. The goal of the Pool billiards is to score as quickly as possible balls in the holes on the pool table. When you started the game - the countdown went. Pool billiards perfectly trains accuracy, calculation and logical thinking. When you focus on the ball, a white line appears, which is responsible for the trajectory of the ball. Choose the right path and hit the ball. Management in the game 8 ball pool is done using a computer mouse. Direct the cue toward balls, choose the trajectory and the power of the flight. Press the left key, push the white ball. Bonuses for extra time will periodically appear on the field. Roll the balls into the pocket and get extra seconds. Point the ball at the bonus and lower the cue to receive it. The victory in the game will depend on how accurately and quickly you can clear the field of billiard balls.

Risk Assessment

Analyzed
49.97
out of 100
MEDIUM

150 security findings detected across all analyzers

Firefox extension requesting 1 permission

Severity Breakdown

0
Critical
15
High
135
Medium
0
Low
0
Info

Finding Categories

15
Malware Signatures
1
Network
133
IoC Indicators

YARA Rules Matched

7 rules(15 hits)
postinstall file manipulation postinstall file download NoUseWeakRandom postinstall obfuscation postinstall system command postinstall network communication postinstall persistence mechanism

Requested Permissions

1 permission
*://*/*
Dangerous

About This Extension

Play Pool billiards and have fun. You have an opportunity to try yourself as a professional player. If you don't know how to play billiards, it's time to learn. The principle of entertainment is simple enough. There are cue and colorful balls in the game. The goal of the Pool billiards is to score as quickly as possible balls in the holes on the pool table. When you started the game - the countdown went. Pool billiards perfectly trains accuracy, calculation and logical thinking. When you focus on the ball, a white line appears, which is responsible for the trajectory of the ball. Choose the right path and hit the ball. Management in the game 8 ball pool is done using a computer mouse. Direct the cue toward balls, choose the trajectory and the power of the flight. Press the left key, push the white ball. Bonuses for extra time will periodically appear on the field. Roll the balls into the pocket and get extra seconds. Point the ball at the bonus and lower the cue to receive it. The victory in the game will depend on how accurately and quickly you can clear the field of billiard balls.

Detailed Findings

16 total

YARA Rule Matches

7 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
13
IP Addresses
12
Domains
104
Strings
133

All Indicators · 133

Domain
detected Domain: goldfirestudios.com

XIOC detected Domain: goldfirestudios.com

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

URL
detected URL: http://thank-you-page.com/?lang=

XIOC detected URL: http://thank-you-page.com/?lang=

extracted_from_files

URL
detected URL: http://thank-you-page.com/?source_type=uninstall&lang='+

XIOC detected URL: http://thank-you-page.com/?source_type=uninstall&lang='+

extracted_from_files

Hash
detected MD5 Hash: c24df040f14488e4773a89cd6843e3b2

XIOC detected MD5 Hash: c24df040f14488e4773a89cd6843e3b2

extracted_from_files

Hash
detected MD5 Hash: FB38685A9F53E411894987D721A5A0C9

XIOC detected MD5 Hash: FB38685A9F53E411894987D721A5A0C9

extracted_from_files

Hash
detected MD5 Hash: 52EECF2353AB11E4B09380FD2F16BEFE

XIOC detected MD5 Hash: 52EECF2353AB11E4B09380FD2F16BEFE

extracted_from_files

Hash
detected MD5 Hash: 52EECF2253AB11E4B09380FD2F16BEFE

XIOC detected MD5 Hash: 52EECF2253AB11E4B09380FD2F16BEFE

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/mm/

XIOC detected URL: http://ns.adobe.com/xap/1.0/mm/

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

XIOC detected URL: http://ns.adobe.com/xap/1.0/sType/ResourceRef#

extracted_from_files

URL
detected URL: http://ns.adobe.com/xap/1.0/

XIOC detected URL: http://ns.adobe.com/xap/1.0/

extracted_from_files

URL
detected URL: http://greensock.com

XIOC detected URL: http://greensock.com

extracted_from_files

URL
detected URL: http://greensock.com/standard-license

XIOC detected URL: http://greensock.com/standard-license

extracted_from_files

URL
detected URL: http://paulbakaus.com/tutorials/html5/web-audio-on-ios/

XIOC detected URL: http://paulbakaus.com/tutorials/html5/web-audio-on-ios/

extracted_from_files

URL
detected URL: http://stackoverflow.com/questions/24119684

XIOC detected URL: http://stackoverflow.com/questions/24119684

extracted_from_files

Domain
detected Domain: dom.id

XIOC detected Domain: dom.id

extracted_from_files

Domain
detected Domain: tab.id

XIOC detected Domain: tab.id

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: http://www.soundrangers.com

XIOC detected URL: http://www.soundrangers.com

extracted_from_files

URL
detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

XIOC detected URL: http://www.w3.org/1999/02/22-rdf-syntax-ns#

extracted_from_files

Domain
detected Domain: node.play

XIOC detected Domain: node.play

extracted_from_files

Domain
detected Domain: self.seek

XIOC detected Domain: self.seek

extracted_from_files

Domain
detected Domain: fn.call

XIOC detected Domain: fn.call

extracted_from_files

Domain
detected Domain: self.off

XIOC detected Domain: self.off

extracted_from_files

Domain
detected Domain: xhr.open

XIOC detected Domain: xhr.open

extracted_from_files

Domain
detected Domain: thank-you-page.com

XIOC detected Domain: thank-you-page.com

extracted_from_files

Domain
detected Domain: info.name

XIOC detected Domain: info.name

extracted_from_files

Domain
detected Domain: p.ly

XIOC detected Domain: p.ly

extracted_from_files

Domain
detected Domain: paulbakaus.com

XIOC detected Domain: paulbakaus.com

extracted_from_files

Domain
detected Domain: stackoverflow.com

XIOC detected Domain: stackoverflow.com

extracted_from_files

Domain
detected Domain: dev.w3.org

XIOC detected Domain: dev.w3.org

extracted_from_files

Domain
detected Domain: howlerjs.com

XIOC detected Domain: howlerjs.com

extracted_from_files

Domain
detected Domain: i.by

XIOC detected Domain: i.by

extracted_from_files

Domain
detected Domain: self.play

XIOC detected Domain: self.play

extracted_from_files

Domain
detected Domain: super.prototype.render.call

XIOC detected Domain: super.prototype.render.call

extracted_from_files

Domain
detected Domain: this.fi

XIOC detected Domain: this.fi

extracted_from_files

Domain
detected Domain: this.fi.ly

XIOC detected Domain: this.fi.ly

extracted_from_files

Domain
detected Domain: this.vc

XIOC detected Domain: this.vc

extracted_from_files

Domain
detected Domain: this.vn

XIOC detected Domain: this.vn

extracted_from_files

Domain
detected Domain: obj.ly

XIOC detected Domain: obj.ly

extracted_from_files

Domain
detected Domain: matrix.ly

XIOC detected Domain: matrix.ly

extracted_from_files

Domain
detected Domain: this.delta

XIOC detected Domain: this.delta

extracted_from_files

Domain
detected Domain: this.inc

XIOC detected Domain: this.inc

extracted_from_files

Domain
detected Domain: super.call

XIOC detected Domain: super.call

extracted_from_files

Domain
detected Domain: model.odata.id

XIOC detected Domain: model.odata.id

extracted_from_files

Domain
detected Domain: model.inc

XIOC detected Domain: model.inc

extracted_from_files

Domain
detected Domain: this.odata.id

XIOC detected Domain: this.odata.id

extracted_from_files

Domain
detected Domain: super.prototype.updateanimation.call

XIOC detected Domain: super.prototype.updateanimation.call

extracted_from_files

Domain
detected Domain: config.global

XIOC detected Domain: config.global

extracted_from_files

Domain
detected Domain: music.play

XIOC detected Domain: music.play

extracted_from_files

Domain
detected Domain: obonusdata.life

XIOC detected Domain: obonusdata.life

extracted_from_files

Domain
detected Domain: ctx.save

XIOC detected Domain: ctx.save

extracted_from_files

Domain
detected Domain: sound.play

XIOC detected Domain: sound.play

extracted_from_files

Domain
detected Domain: item.id

XIOC detected Domain: item.id

extracted_from_files

Domain
detected Domain: attributes.id

XIOC detected Domain: attributes.id

extracted_from_files

Domain
detected Domain: tween.seek

XIOC detected Domain: tween.seek

extracted_from_files

Domain
detected Domain: pt.pg

XIOC detected Domain: pt.pg

extracted_from_files

Domain
detected Domain: animation.prototype.invalidate.call

XIOC detected Domain: animation.prototype.invalidate.call

extracted_from_files

Domain
detected Domain: enabled.call

XIOC detected Domain: enabled.call

extracted_from_files

Domain
detected Domain: pt2.pr

XIOC detected Domain: pt2.pr

extracted_from_files

Domain
detected Domain: pt.pr

XIOC detected Domain: pt.pr

extracted_from_files

Domain
detected Domain: tweenplugin.call

XIOC detected Domain: tweenplugin.call

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: startvars.data

XIOC detected Domain: startvars.data

extracted_from_files

URL
detected URL: http://dev.w3.org/html5/spec-author-view/spec.html#mediaerror).

XIOC detected URL: http://dev.w3.org/html5/spec-author-view/spec.html#mediaerror).

extracted_from_files

Domain
detected Domain: target.style

XIOC detected Domain: target.style

extracted_from_files

Domain
detected Domain: addproptween.call

XIOC detected Domain: addproptween.call

extracted_from_files

Domain
detected Domain: timeline.seek

XIOC detected Domain: timeline.seek

extracted_from_files

Domain
detected Domain: eventdispatcher.call

XIOC detected Domain: eventdispatcher.call

extracted_from_files

Domain
detected Domain: this.data

XIOC detected Domain: this.data

extracted_from_files

Domain
detected Domain: vars.data

XIOC detected Domain: vars.data

extracted_from_files

Domain
detected Domain: p.play

XIOC detected Domain: p.play

extracted_from_files

Domain
detected Domain: this.seek

XIOC detected Domain: this.seek

extracted_from_files

Domain
detected Domain: p.seek

XIOC detected Domain: p.seek

extracted_from_files

Domain
detected Domain: callback.call

XIOC detected Domain: callback.call

extracted_from_files

Domain
detected Domain: tweenlite.to

XIOC detected Domain: tweenlite.to

extracted_from_files

Domain
detected Domain: this.sc

XIOC detected Domain: this.sc

extracted_from_files

Domain
detected Domain: windows.gs

XIOC detected Domain: windows.gs

extracted_from_files

Domain
detected Domain: ease.map

XIOC detected Domain: ease.map

extracted_from_files

Domain
detected Domain: listener.pr

XIOC detected Domain: listener.pr

extracted_from_files

Domain
detected Domain: listener.c.call

XIOC detected Domain: listener.c.call

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: rf湟.lc

XIOC detected Domain: rf湟.lc

extracted_from_files

Domain
detected Domain: ta酖.ni

XIOC detected Domain: ta酖.ni

extracted_from_files

Domain
detected Domain: greensock.com

XIOC detected Domain: greensock.com

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: tostring.call

XIOC detected Domain: tostring.call

extracted_from_files

Domain
detected Domain: gs.tweenlite.to

XIOC detected Domain: gs.tweenlite.to

extracted_from_files

Domain
detected Domain: a.is

XIOC detected Domain: a.is

extracted_from_files

Domain
detected Domain: s4.jcp

XIOC detected Domain: s4.jcp

extracted_from_files

Domain
detected Domain: 9.yt

XIOC detected Domain: 9.yt

extracted_from_files

Domain
detected Domain: o.dk

XIOC detected Domain: o.dk

extracted_from_files

Domain
detected Domain: 4.cy

XIOC detected Domain: 4.cy

extracted_from_files

Domain
detected Domain: v.kw

XIOC detected Domain: v.kw

extracted_from_files

Domain
detected Domain: ɞ.sr

XIOC detected Domain: ɞ.sr

extracted_from_files

Domain
detected Domain: 2ȹ.ro

XIOC detected Domain: 2ȹ.ro

extracted_from_files

Domain
detected Domain: v.ee

XIOC detected Domain: v.ee

extracted_from_files

Domain
detected Domain: pt.data

XIOC detected Domain: pt.data

extracted_from_files

Domain
detected Domain: ĕ.qa

XIOC detected Domain: ĕ.qa

extracted_from_files

Domain
detected Domain: w.wf

XIOC detected Domain: w.wf

extracted_from_files

Domain
detected Domain: y.je

XIOC detected Domain: y.je

extracted_from_files

Domain
detected Domain: o5.sk

XIOC detected Domain: o5.sk

extracted_from_files

Domain
detected Domain: 4.ph

XIOC detected Domain: 4.ph

extracted_from_files

Domain
detected Domain: a.cd

XIOC detected Domain: a.cd

extracted_from_files

Domain
detected Domain: d.to

XIOC detected Domain: d.to

extracted_from_files

Domain
detected Domain: ke.ee

XIOC detected Domain: ke.ee

extracted_from_files

Domain
detected Domain: bޒpq.bd

XIOC detected Domain: bޒpq.bd

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

Domain
detected Domain: t978914dd36d1a6dab59dd2a73c668ef0.c24df040f14488e4773a89cd6843e3b2.addons.mozilla.org

XIOC detected Domain: t978914dd36d1a6dab59dd2a73c668ef0.c24df040f14488e4773a89cd6843e3b2.addons.mozilla.org

extracted_from_files

IP
detected Domain: xiph.org

XIOC detected Domain: xiph.org

extracted_from_files

Domain
detected Domain: soundrangers.com

XIOC detected Domain: soundrangers.com

extracted_from_files

Domain
detected Domain: q.se

XIOC detected Domain: q.se

extracted_from_files

Domain
detected Domain: 聚.pa

XIOC detected Domain: 聚.pa

extracted_from_files

Domain
detected Domain: 0.gm

XIOC detected Domain: 0.gm

extracted_from_files

Domain
detected Domain: www.soundrangers.com

XIOC detected Domain: www.soundrangers.com

extracted_from_files

IP
detected IP: 5::

XIOC detected IP: 5::

extracted_from_files

IP
detected IP: 9::

XIOC detected IP: 9::

extracted_from_files

IP
detected IP: 1.0.0.10

XIOC detected IP: 1.0.0.10

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

IP
detected IP: ::31

XIOC detected IP: ::31

extracted_from_files

IP
detected IP: ::c

XIOC detected IP: ::c

extracted_from_files

IP
detected IP: e::

XIOC detected IP: e::

extracted_from_files

IP
detected IP: a::

XIOC detected IP: a::

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

IP
detected IP: b::

XIOC detected IP: b::

extracted_from_files

Domain
detected Domain: animation.call

XIOC detected Domain: animation.call

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Pool is a Firefox Add-ons extension published by mr_JSm1th. Version 1.0.0.10resigned1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 49.97/100 (MEDIUM risk) based on 150 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 15 finding(s)
  • Medium: 135 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Pool is published by mr_JSm1th on the Firefox Add-ons marketplace. The extension has approximately 80 users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions