Is "MIA : MOCA Intelligent Assistant" on Microsoft Edge Add-ons Safe to Install?

Moca Financial · edge · v1.3.0

Mia by MOCA is your online payment assistant. When you are ready to make an online payment just open Mia and choose one of your existing MOCA Cards or have Mia create a new, one-time use card and complete your transaction. It’s that easy.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

347 security findings detected across all analyzers

Severity Breakdown

0
Critical
54
High
251
Medium
0
Low
0
Info

Finding Categories

54
Malware Signatures
22
Network
229
IoC Indicators

YARA Rules Matched

11 rules(54 hits)
postinstall crypto operations postinstall obfuscation postinstall system command postinstall file download NoUseWeakRandom postinstall network communication postinstall file manipulation SQLInjection postinstall environment access credential env files LocalStorageShouldNotBeUsed

Detailed Findings

118 total

YARA Rule Matches

11 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
11
IP Addresses
7
Domains
209
Strings
229

All Indicators · 229

Domain
detected Domain: f.setup.call

XIOC detected Domain: f.setup.call

extracted_from_files

Domain
detected Domain: kjur.asn1.dernumericstring.superclass.constructor.call

XIOC detected Domain: kjur.asn1.dernumericstring.superclass.constructor.call

extracted_from_files

Domain
detected Domain: olddata.call

XIOC detected Domain: olddata.call

extracted_from_files

Domain
detected Domain: jquery.tween.prototype.run

XIOC detected Domain: jquery.tween.prototype.run

extracted_from_files

URL
detected URL: http://bugs.jquery.com/ticket/11820

XIOC detected URL: http://bugs.jquery.com/ticket/11820

extracted_from_files

URL
detected URL: https://mocapay.com/

XIOC detected URL: https://mocapay.com/

extracted_from_files

URL
detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

XIOC detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

extracted_from_files

URL
detected URL: https://mocapay.com/contact-us/

XIOC detected URL: https://mocapay.com/contact-us/

extracted_from_files

Domain
detected Domain: info.id

XIOC detected Domain: info.id

extracted_from_files

IP
detected Domain: card.zip

XIOC detected Domain: card.zip

extracted_from_files

Domain
detected Domain: lngele.map

XIOC detected Domain: lngele.map

extracted_from_files

Domain
detected Domain: instransactiondata.data

XIOC detected Domain: instransactiondata.data

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://npmcdn.com/[email protected]/LICENSE.txt

XIOC detected URL: https://npmcdn.com/[email protected]/LICENSE.txt

extracted_from_files

Domain
detected Domain: card.id

XIOC detected Domain: card.id

extracted_from_files

Domain
detected Domain: translate.page.link

XIOC detected Domain: translate.page.link

extracted_from_files

Domain
detected Domain: carddata.data

XIOC detected Domain: carddata.data

extracted_from_files

Domain
detected Domain: my.mocapay.com

XIOC detected Domain: my.mocapay.com

extracted_from_files

Domain
detected Domain: userdata.id

XIOC detected Domain: userdata.id

extracted_from_files

Domain
detected Domain: logindata.data

XIOC detected Domain: logindata.data

extracted_from_files

Domain
detected Domain: userresponse.data

XIOC detected Domain: userresponse.data

extracted_from_files

Domain
detected Domain: port.name

XIOC detected Domain: port.name

extracted_from_files

Domain
detected Domain: r.vu

XIOC detected Domain: r.vu

extracted_from_files

Domain
detected Domain: www.inkscape.org

XIOC detected Domain: www.inkscape.org

extracted_from_files

Domain
detected Domain: common.help

XIOC detected Domain: common.help

extracted_from_files

Domain
detected Domain: instdata.data

XIOC detected Domain: instdata.data

extracted_from_files

Domain
detected Domain: data.id

XIOC detected Domain: data.id

extracted_from_files

Domain
detected Domain: messageframe.id

XIOC detected Domain: messageframe.id

extracted_from_files

Domain
detected Domain: translateelem.map

XIOC detected Domain: translateelem.map

extracted_from_files

Domain
detected Domain: mocalab.net

XIOC detected Domain: mocalab.net

extracted_from_files

Domain
detected Domain: mocapay.com

XIOC detected Domain: mocapay.com

extracted_from_files

Domain
detected Domain: elemoptionarray.map

XIOC detected Domain: elemoptionarray.map

extracted_from_files

Domain
detected Domain: inputs.name

XIOC detected Domain: inputs.name

extracted_from_files

Domain
detected Domain: finalinputs.map

XIOC detected Domain: finalinputs.map

extracted_from_files

Domain
detected Domain: getpageinputs.map

XIOC detected Domain: getpageinputs.map

extracted_from_files

Domain
detected Domain: tournext.id

XIOC detected Domain: tournext.id

extracted_from_files

Domain
detected Domain: tourpre.id

XIOC detected Domain: tourpre.id

extracted_from_files

Domain
detected Domain: tourdone.id

XIOC detected Domain: tourdone.id

extracted_from_files

Domain
detected Domain: elementposistion.top

XIOC detected Domain: elementposistion.top

extracted_from_files

Domain
detected Domain: page.page

XIOC detected Domain: page.page

extracted_from_files

Domain
detected Domain: this.page

XIOC detected Domain: this.page

extracted_from_files

Domain
detected Domain: lngconst.open

XIOC detected Domain: lngconst.open

extracted_from_files

Domain
detected Domain: messagebox.id

XIOC detected Domain: messagebox.id

extracted_from_files

Domain
detected Domain: span.id

XIOC detected Domain: span.id

extracted_from_files

URL
detected Domain: url.prod

XIOC detected Domain: url.prod

extracted_from_files

Domain
detected Domain: span.open

XIOC detected Domain: span.open

extracted_from_files

Domain
detected Domain: wrapper.id

XIOC detected Domain: wrapper.id

extracted_from_files

Domain
detected Domain: tourtext.id

XIOC detected Domain: tourtext.id

extracted_from_files

Domain
detected Domain: toursteps.id

XIOC detected Domain: toursteps.id

extracted_from_files

Domain
detected Domain: func.call

XIOC detected Domain: func.call

extracted_from_files

Domain
detected Domain: cardtypedata.data

XIOC detected Domain: cardtypedata.data

extracted_from_files

Domain
detected Domain: mcctypedata.data

XIOC detected Domain: mcctypedata.data

extracted_from_files

Domain
detected Domain: blockflagdata.data

XIOC detected Domain: blockflagdata.data

extracted_from_files

Domain
detected Domain: selbox.style.top

XIOC detected Domain: selbox.style.top

extracted_from_files

Domain
detected Domain: selbox.select

XIOC detected Domain: selbox.select

extracted_from_files

Domain
detected Domain: loader.id

XIOC detected Domain: loader.id

extracted_from_files

Domain
detected Domain: elem.style

XIOC detected Domain: elem.style

extracted_from_files

Hash
detected MD5 Hash: 8DAAD6E9A45011E9A33C905DF5B59AFA

XIOC detected MD5 Hash: 8DAAD6E9A45011E9A33C905DF5B59AFA

extracted_from_files

Domain
detected Domain: oldparam.call

XIOC detected Domain: oldparam.call

extracted_from_files

Domain
detected Domain: deferred.fail

XIOC detected Domain: deferred.fail

extracted_from_files

URL
detected URL: http://www-cs-students.stanford.edu/~tjw/jsbn/

XIOC detected URL: http://www-cs-students.stanford.edu/~tjw/jsbn/

extracted_from_files

URL
detected URL: http://kjur.github.com/jsrsasign/license

XIOC detected URL: http://kjur.github.com/jsrsasign/license

extracted_from_files

URL
detected URL: http://kjur.github.io/jsrsasign/license/

XIOC detected URL: http://kjur.github.io/jsrsasign/license/

extracted_from_files

Domain
detected Domain: s.now

XIOC detected Domain: s.now

extracted_from_files

Domain
detected Domain: bugs.jquery.com

XIOC detected Domain: bugs.jquery.com

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: jqxhr.fail

XIOC detected Domain: jqxhr.fail

extracted_from_files

Domain
detected Domain: jquery.data

XIOC detected Domain: jquery.data

extracted_from_files

Domain
detected Domain: r.open

XIOC detected Domain: r.open

extracted_from_files

Domain
detected Domain: i.data

XIOC detected Domain: i.data

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: t.top

XIOC detected Domain: t.top

extracted_from_files

Domain
detected Domain: f.top

XIOC detected Domain: f.top

extracted_from_files

Domain
detected Domain: t.top-s.top

XIOC detected Domain: t.top-s.top

extracted_from_files

Domain
detected Domain: t.using.call

XIOC detected Domain: t.using.call

extracted_from_files

Domain
detected Domain: wt.host

XIOC detected Domain: wt.host

extracted_from_files

Domain
detected Domain: r.host

XIOC detected Domain: r.host

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: v.global

XIOC detected Domain: v.global

extracted_from_files

Domain
detected Domain: v.beforesend.call

XIOC detected Domain: v.beforesend.call

extracted_from_files

Domain
detected Domain: t.fail

XIOC detected Domain: t.fail

extracted_from_files

Domain
detected Domain: s.data

XIOC detected Domain: s.data

extracted_from_files

Domain
detected Domain: l.opts.fail

XIOC detected Domain: l.opts.fail

extracted_from_files

Domain
detected Domain: a.empty.fire

XIOC detected Domain: a.empty.fire

extracted_from_files

Domain
detected Domain: s.fx.off

XIOC detected Domain: s.fx.off

extracted_from_files

Domain
detected Domain: r.old.call

XIOC detected Domain: r.old.call

extracted_from_files

Domain
detected Domain: r.stop.call

XIOC detected Domain: r.stop.call

extracted_from_files

Domain
detected Domain: finish.call

XIOC detected Domain: finish.call

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: l.style

XIOC detected Domain: l.style

extracted_from_files

Domain
detected Domain: this.now

XIOC detected Domain: this.now

extracted_from_files

Domain
detected Domain: this.options.step.call

XIOC detected Domain: this.options.step.call

extracted_from_files

Domain
detected Domain: e.elem.style

XIOC detected Domain: e.elem.style

extracted_from_files

Domain
detected Domain: e.now

XIOC detected Domain: e.now

extracted_from_files

Domain
detected Domain: l.opts.start.call

XIOC detected Domain: l.opts.start.call

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: d.call

XIOC detected Domain: d.call

extracted_from_files

Domain
detected Domain: t.events

XIOC detected Domain: t.events

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: e.style

XIOC detected Domain: e.style

extracted_from_files

Domain
detected Domain: c.predispatch.call

XIOC detected Domain: c.predispatch.call

extracted_from_files

Domain
detected Domain: s.event.handlers.call

XIOC detected Domain: s.event.handlers.call

extracted_from_files

Domain
detected Domain: u.data

XIOC detected Domain: u.data

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: c.postdispatch.call

XIOC detected Domain: c.postdispatch.call

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: t.click

XIOC detected Domain: t.click

extracted_from_files

Domain
detected Domain: ge.td

XIOC detected Domain: ge.td

extracted_from_files

Domain
detected Domain: v.events

XIOC detected Domain: v.events

extracted_from_files

Domain
detected Domain: f.teardown.call

XIOC detected Domain: f.teardown.call

extracted_from_files

Domain
detected Domain: jquery.fn.css.call

XIOC detected Domain: jquery.fn.css.call

extracted_from_files

Domain
detected Domain: s.event.global

XIOC detected Domain: s.event.global

extracted_from_files

Domain
detected Domain: f.remove.call

XIOC detected Domain: f.remove.call

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

Hash
detected MD5 Hash: 5D20892493BFDB11914A8590D31508C8

XIOC detected MD5 Hash: 5D20892493BFDB11914A8590D31508C8

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: originalfix.call

XIOC detected Domain: originalfix.call

extracted_from_files

Domain
detected Domain: o.empty.fire

XIOC detected Domain: o.empty.fire

extracted_from_files

Domain
detected Domain: s.style

XIOC detected Domain: s.style

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: ge.th

XIOC detected Domain: ge.th

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: e.next

XIOC detected Domain: e.next

extracted_from_files

Domain
detected Domain: q.call

XIOC detected Domain: q.call

extracted_from_files

Domain
detected Domain: se.select

XIOC detected Domain: se.select

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: a.id

XIOC detected Domain: a.id

extracted_from_files

Domain
detected Domain: se.support

XIOC detected Domain: se.support

extracted_from_files

Domain
detected Domain: n.top

XIOC detected Domain: n.top

extracted_from_files

Domain
detected Domain: b.filter.id

XIOC detected Domain: b.filter.id

extracted_from_files

Domain
detected Domain: b.find.id

XIOC detected Domain: b.find.id

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: s.map

XIOC detected Domain: s.map

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: v.call

XIOC detected Domain: v.call

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: u.call

XIOC detected Domain: u.call

extracted_from_files

Domain
detected Domain: bankdata.name

XIOC detected Domain: bankdata.name

extracted_from_files

Domain
detected Domain: request.id

XIOC detected Domain: request.id

extracted_from_files

Domain
detected Domain: partydata.otherdetails.name

XIOC detected Domain: partydata.otherdetails.name

extracted_from_files

Domain
detected Domain: window.location.search

XIOC detected Domain: window.location.search

extracted_from_files

Domain
detected Domain: jquery.org

XIOC detected Domain: jquery.org

extracted_from_files

Domain
detected Domain: t.flat.call

XIOC detected Domain: t.flat.call

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: kjur.asn1.derset.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derset.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.dertaggedobject.superclass.constructor.call

XIOC detected Domain: kjur.asn1.dertaggedobject.superclass.constructor.call

extracted_from_files

Domain
detected Domain: i.re

XIOC detected Domain: i.re

extracted_from_files

Domain
detected Domain: this.stream

XIOC detected Domain: this.stream

extracted_from_files

Domain
detected Domain: ue.call

XIOC detected Domain: ue.call

extracted_from_files

Domain
detected Domain: tostring.call

XIOC detected Domain: tostring.call

extracted_from_files

Domain
detected Domain: window.chrome

XIOC detected Domain: window.chrome

extracted_from_files

Domain
detected Domain: kjur.asn1.derteletexstring.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derteletexstring.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.deria5string.superclass.constructor.call

XIOC detected Domain: kjur.asn1.deria5string.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.derutctime.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derutctime.superclass.constructor.call

extracted_from_files

Domain
detected Domain: this.date

XIOC detected Domain: this.date

extracted_from_files

Domain
detected Domain: t.date

XIOC detected Domain: t.date

extracted_from_files

Domain
detected Domain: kjur.asn1.dergeneralizedtime.superclass.constructor.call

XIOC detected Domain: kjur.asn1.dergeneralizedtime.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.dersequence.superclass.constructor.call

XIOC detected Domain: kjur.asn1.dersequence.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.dernull.superclass.constructor.call

XIOC detected Domain: kjur.asn1.dernull.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.derobjectidentifier.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derobjectidentifier.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.x509.oid.name

XIOC detected Domain: kjur.asn1.x509.oid.name

extracted_from_files

URL
detected URL: https://my.mocapay.com/pending-loop/forgot-password

XIOC detected URL: https://my.mocapay.com/pending-loop/forgot-password

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: kjur.asn1.derprintablestring.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derprintablestring.superclass.constructor.call

extracted_from_files

Domain
detected Domain: this.ht

XIOC detected Domain: this.ht

extracted_from_files

Domain
detected Domain: kjur.asn1.derabstractstring.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derabstractstring.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.derabstracttime.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derabstracttime.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.derboolean.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derboolean.superclass.constructor.call

extracted_from_files

Domain
detected Domain: kjur.asn1.derinteger.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derinteger.superclass.constructor.call

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: s.secure

XIOC detected Domain: s.secure

extracted_from_files

Domain
detected Domain: kjur.asn1.deroctetstring.superclass.constructor.call

XIOC detected Domain: kjur.asn1.deroctetstring.superclass.constructor.call

extracted_from_files

Domain
detected Domain: s.mobile

XIOC detected Domain: s.mobile

extracted_from_files

Domain
detected Domain: s.android

XIOC detected Domain: s.android

extracted_from_files

Domain
detected Domain: s.chrome

XIOC detected Domain: s.chrome

extracted_from_files

Domain
detected Domain: s.ie

XIOC detected Domain: s.ie

extracted_from_files

Domain
detected Domain: ce.env.ua

XIOC detected Domain: ce.env.ua

extracted_from_files

Domain
detected Domain: ce.env.ua.ie

XIOC detected Domain: ce.env.ua.ie

extracted_from_files

Domain
detected Domain: e.one

XIOC detected Domain: e.one

extracted_from_files

Domain
detected Domain: this.am

XIOC detected Domain: this.am

extracted_from_files

Domain
detected Domain: this.mu

XIOC detected Domain: this.mu

extracted_from_files

Domain
detected Domain: oe.next

XIOC detected Domain: oe.next

extracted_from_files

Domain
detected Domain: e.prototype.am

XIOC detected Domain: e.prototype.am

extracted_from_files

Domain
detected Domain: e.prototype.dm

XIOC detected Domain: e.prototype.dm

extracted_from_files

Domain
detected Domain: te.prototype.next

XIOC detected Domain: te.prototype.next

extracted_from_files

Domain
detected Domain: e.am

XIOC detected Domain: e.am

extracted_from_files

Domain
detected Domain: h.am

XIOC detected Domain: h.am

extracted_from_files

Domain
detected Domain: e.zero

XIOC detected Domain: e.zero

extracted_from_files

Domain
detected Domain: this.mp

XIOC detected Domain: this.mp

extracted_from_files

Domain
detected Domain: this.mt

XIOC detected Domain: this.mt

extracted_from_files

Domain
detected Domain: t.dm

XIOC detected Domain: t.dm

extracted_from_files

Domain
detected Domain: this.m.am

XIOC detected Domain: this.m.am

extracted_from_files

Domain
detected Domain: www-cs-students.stanford.edu

XIOC detected Domain: www-cs-students.stanford.edu

extracted_from_files

Domain
detected Domain: kjur.github.com

XIOC detected Domain: kjur.github.com

extracted_from_files

Domain
detected Domain: kjur.github.io

XIOC detected Domain: kjur.github.io

extracted_from_files

Domain
detected Domain: gmail.com

XIOC detected Domain: gmail.com

extracted_from_files

Domain
detected Domain: lapo.it

XIOC detected Domain: lapo.it

extracted_from_files

Domain
detected Domain: this.dm

XIOC detected Domain: this.dm

extracted_from_files

Domain
detected Domain: r.am

XIOC detected Domain: r.am

extracted_from_files

Domain
detected Domain: li.name

XIOC detected Domain: li.name

extracted_from_files

Domain
detected Domain: option.select

XIOC detected Domain: option.select

extracted_from_files

Domain
detected Domain: form-group.name

XIOC detected Domain: form-group.name

extracted_from_files

Domain
detected Domain: ajaxload.info

XIOC detected Domain: ajaxload.info

extracted_from_files

Domain
detected Domain: ns.adobe.com

XIOC detected Domain: ns.adobe.com

extracted_from_files

URL
detected Domain: purl.org

XIOC detected Domain: purl.org

extracted_from_files

Domain
detected Domain: npmcdn.com

XIOC detected Domain: npmcdn.com

extracted_from_files

IP
detected IP: e::bef

XIOC detected IP: e::bef

extracted_from_files

IP
detected IP: e::af

XIOC detected IP: e::af

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: ed::af

XIOC detected IP: ed::af

extracted_from_files

IP
detected IP: 9::

XIOC detected IP: 9::

extracted_from_files

Domain
detected Domain: messagebox.show

XIOC detected Domain: messagebox.show

extracted_from_files

Domain
detected Domain: form-action.center

XIOC detected Domain: form-action.center

extracted_from_files

Hash
detected MD5 Hash: 8DAAD6E8A45011E9A33C905DF5B59AFA

XIOC detected MD5 Hash: 8DAAD6E8A45011E9A33C905DF5B59AFA

extracted_from_files

Domain
detected Domain: kjur.asn1.derbitstring.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derbitstring.superclass.constructor.call

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: kjur.asn1.derutf8string.superclass.constructor.call

XIOC detected Domain: kjur.asn1.derutf8string.superclass.constructor.call

extracted_from_files

Domain
detected Domain: f.add.call

XIOC detected Domain: f.add.call

extracted_from_files

Security Analysis Summary

Security Analysis Overview

MIA : MOCA Intelligent Assistant is a edge extension published by Moca Financial. Version 1.3.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 347 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 54 finding(s)
  • Medium: 251 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

MIA : MOCA Intelligent Assistant is published by Moca Financial on the edge marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions