Is "Ninja Hacker Cat" on Firefox Add-ons Safe to Install?

Alex · firefox · v1.7

This extension will make simple security requests for you. It can check the website you are visiting for security issue. You should only use it on your own websites. It can detect versions of the running web application and check if thats a vulnerable version. The detection is based on versions detection or proof of concept requests. Current detections: Simple Cross Site Scripting, SQL Injections and Wordpress-Backups. CVS: Confluence Server (CVE-2022-26134), Bitbucket Server (CVE-2022-36804), Exchange Server Proxyshell (CVE-2021-34473), Apache (CVE-2021-41773), Weblogic Console (CVE-2020-14882). The detections are under development. Current detections are listed in GitHub: https://github.com/Leetcore/ninja-hacker-cat

Risk Assessment

Analyzed
61.53
out of 100
MEDIUM

98 security findings detected across all analyzers

Firefox extension requesting 3 permissions

Severity Breakdown

0
Critical
32
High
66
Medium
0
Low
0
Info

Finding Categories

32
Malware Signatures
4
Network
61
IoC Indicators

YARA Rules Matched

9 rules(32 hits)
postinstall network communication postinstall file download postinstall environment access postinstall system command postinstall file manipulation postinstall obfuscation credential git credentials credential docker env postinstall registry modification

Requested Permissions

3 permissions
<all_urls>

Access and modify data on every website you visit

Dangerous
webRequest

Intercept, modify, and block all network requests

High
notifications
Low

About This Extension

This extension will make simple security requests for you. It can check the website you are visiting for security issue. You should only use it on your own websites. It can detect versions of the running web application and check if thats a vulnerable version. The detection is based on versions detection or proof of concept requests. Current detections: Simple Cross Site Scripting, SQL Injections and Wordpress-Backups. CVS: Confluence Server (CVE-2022-26134), Bitbucket Server (CVE-2022-36804), Exchange Server Proxyshell (CVE-2021-34473), Apache (CVE-2021-41773), Weblogic Console (CVE-2020-14882). The detections are under development. Current detections are listed in GitHub: <a href="https://prod.outgoing.prod.webservices.mozgcp.net/v1/19d0c4280be35805390fb70cd35a6f2ea3b0b565d50bc2ec7797a1eaa68b1933/https%3A//github.com/Leetcore/ninja-hacker-cat" rel="nofollow">https://github.com/Leetcore/ninja-hacker-cat</a>

Detailed Findings

37 total

YARA Rule Matches

9 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
14
IP Addresses
12
Domains
35
Strings
61

All Indicators · 61

Domain
detected Domain: wp-config.php.save

XIOC detected Domain: wp-config.php.save

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: https://addons.mozilla.org/de/firefox/addon/ninja-hacker-cat/

XIOC detected URL: https://addons.mozilla.org/de/firefox/addon/ninja-hacker-cat/

extracted_from_files

URL
detected URL: https://github.com/vulhub/vulhub/tree/master/confluence/CVE-2022-26134

XIOC detected URL: https://github.com/vulhub/vulhub/tree/master/confluence/CVE-2022-26134

extracted_from_files

URL
detected URL: https://portswigger.net/support/using-burp-to-test-for-os-command-injection-vulnerabilities)

XIOC detected URL: https://portswigger.net/support/using-burp-to-test-for-os-command-injection-vulnerabilities)

extracted_from_files

URL
detected URL: https://github.com/horizon3ai/CVE-2022-1388/blob/main/CVE-2022-1388.py)

XIOC detected URL: https://github.com/horizon3ai/CVE-2022-1388/blob/main/CVE-2022-1388.py)

extracted_from_files

URL
detected URL: https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html)

XIOC detected URL: https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html)

extracted_from_files

URL
detected URL: https://www.1337core.de

XIOC detected URL: https://www.1337core.de

extracted_from_files

Domain
detected Domain: t.gr

XIOC detected Domain: t.gr

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

URL
detected URL: https://mozilla.org/MPL/2.0/.

XIOC detected URL: https://mozilla.org/MPL/2.0/.

extracted_from_files

URL
detected URL: http://addons.mozilla.org/ca/crl.pem0N

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

extracted_from_files

URL
detected URL: https://github.com/Leetcore/ninja-hacker-cat

XIOC detected URL: https://github.com/Leetcore/ninja-hacker-cat

extracted_from_files

URL
detected URL: https://github.com/sponsors/Leetcore

XIOC detected URL: https://github.com/sponsors/Leetcore

extracted_from_files

URL
detected URL: https://ko-fi.com/leetcore

XIOC detected URL: https://ko-fi.com/leetcore

extracted_from_files

IP
detected Domain: backup.zip

XIOC detected Domain: backup.zip

extracted_from_files

Domain
detected Domain: readme.md

XIOC detected Domain: readme.md

extracted_from_files

Domain
detected Domain: foo.com

XIOC detected Domain: foo.com

extracted_from_files

Domain
detected Domain: windowinfo.id

XIOC detected Domain: windowinfo.id

extracted_from_files

Domain
detected Domain: header.name

XIOC detected Domain: header.name

extracted_from_files

Domain
detected Domain: s.ph

XIOC detected Domain: s.ph

extracted_from_files

Domain
detected Domain: ݢ.gd

XIOC detected Domain: ݢ.gd

extracted_from_files

Domain
detected Domain: ko-fi.com

XIOC detected Domain: ko-fi.com

extracted_from_files

Domain
detected Domain: www.1337core.de

XIOC detected Domain: www.1337core.de

extracted_from_files

Domain
detected Domain: portswigger.net

XIOC detected Domain: portswigger.net

extracted_from_files

Domain
detected Domain: www.synacktiv.com

XIOC detected Domain: www.synacktiv.com

extracted_from_files

Domain
detected Domain: cve-2022-1388.py

XIOC detected Domain: cve-2022-1388.py

extracted_from_files

IP
detected Domain: ninja-hacker-cat.zip

XIOC detected Domain: ninja-hacker-cat.zip

extracted_from_files

Hash
detected MD5 Hash: edd1c9f034335f136f87ad84b625c8f1

XIOC detected MD5 Hash: edd1c9f034335f136f87ad84b625c8f1

extracted_from_files

Domain
detected Domain: z.tv

XIOC detected Domain: z.tv

extracted_from_files

Domain
detected Domain: 낹.ki

XIOC detected Domain: 낹.ki

extracted_from_files

Domain
detected Domain: ԥ.sk

XIOC detected Domain: ԥ.sk

extracted_from_files

Domain
detected Domain: p.td

XIOC detected Domain: p.td

extracted_from_files

Domain
detected Domain: b.ge

XIOC detected Domain: b.ge

extracted_from_files

Domain
detected Domain: y.hu

XIOC detected Domain: y.hu

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: mozilla.com

XIOC detected Domain: mozilla.com

extracted_from_files

Domain
detected Domain: addons.mozilla.org

XIOC detected Domain: addons.mozilla.org

extracted_from_files

Domain
detected Domain: content-signature.mozilla.org

XIOC detected Domain: content-signature.mozilla.org

extracted_from_files

Domain
detected Domain: tc525924ea5d91b1457dcbd826bb64454.4664a6fac6428c9786ab1952b077c1bf.addons.mozilla.org

XIOC detected Domain: tc525924ea5d91b1457dcbd826bb64454.4664a6fac6428c9786ab1952b077c1bf.addons.mozilla.org

extracted_from_files

Domain
detected Domain: ę6.jm

XIOC detected Domain: ę6.jm

extracted_from_files

Domain
detected Domain: rule.cat

XIOC detected Domain: rule.cat

extracted_from_files

Domain
detected Domain: options.data

XIOC detected Domain: options.data

extracted_from_files

IP
detected IP: 127.0.0.1

XIOC detected IP: 127.0.0.1

extracted_from_files

IP
detected IP: 5::e

XIOC detected IP: 5::e

extracted_from_files

Domain
detected Domain: mozilla.org

XIOC detected Domain: mozilla.org

extracted_from_files

Domain
detected Domain: rubygems.org

XIOC detected Domain: rubygems.org

extracted_from_files

Domain
detected Domain: miau2.mp

XIOC detected Domain: miau2.mp

extracted_from_files

Domain
detected Domain: miau1.mp

XIOC detected Domain: miau1.mp

extracted_from_files

Domain
detected Domain: signingca1.addons.mozilla.org

XIOC detected Domain: signingca1.addons.mozilla.org

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

IP
detected IP: 2::

XIOC detected IP: 2::

extracted_from_files

IP
detected IP: 0::

XIOC detected IP: 0::

extracted_from_files

IP
detected IP: 4::

XIOC detected IP: 4::

extracted_from_files

IP
detected IP: c::

XIOC detected IP: c::

extracted_from_files

IP
detected IP: ::4

XIOC detected IP: ::4

extracted_from_files

IP
detected IP: ::a

XIOC detected IP: ::a

extracted_from_files

Hash
detected MD5 Hash: 4664a6fac6428c9786ab1952b077c1bf

XIOC detected MD5 Hash: 4664a6fac6428c9786ab1952b077c1bf

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: https://rubygems.org

XIOC detected URL: https://rubygems.org

extracted_from_files

URL
detected URL: https://www.1337core.de/

XIOC detected URL: https://www.1337core.de/

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Ninja Hacker Cat is a Firefox Add-ons extension published by Alex. Version 1.7 has been analyzed by the Risky Plugins security platform, receiving a risk score of 61.53/100 (MEDIUM risk) based on 98 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • High: 32 finding(s)
  • Medium: 66 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Ninja Hacker Cat is published by Alex on the Firefox Add-ons marketplace. The extension has approximately 52 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions