HIGH RISK NaN/100

ScanURL.me

Unknown developer · 18 users at risk

Threat Summary

Risk Level
Critical Issues
High Issues
Total Findings

Key Security Threats

HIGH Malware Signature

YARA rule match: -postinstall_network_communication

/tmp/extract-e047c62ccab04f04c057674edb235941b6eb317c79311c0df46071963343411a-3699473066/error.html

HIGH Malware Signature

YARA rule match: -postinstall_system_command

/tmp/extract-e047c62ccab04f04c057674edb235941b6eb317c79311c0df46071963343411a-3699473066/error.html

HIGH Malware Signature

YARA rule match: -postinstall_network_communication

/tmp/extract-e047c62ccab04f04c057674edb235941b6eb317c79311c0df46071963343411a-3699473066/error.js

HIGH Malware Signature

YARA rule match: -postinstall_file_download

/tmp/extract-e047c62ccab04f04c057674edb235941b6eb317c79311c0df46071963343411a-3699473066/popup.js

HIGH Malware Signature

YARA rule match: -postinstall_system_command

/tmp/extract-e047c62ccab04f04c057674edb235941b6eb317c79311c0df46071963343411a-3699473066/context_warning.html

All Findings (39)

View all 39 security findings
Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_download

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_system_command

Malware Signature

YARA rule match: -postinstall_file_manipulation

Malware Signature

YARA rule match: -postinstall_network_communication

Malware Signature

YARA rule match: -postinstall_file_download

Suspicious Network Activity

Network call of type 'fetch' detected.

Suspicious Network Activity

Network call of type 'fetch' detected.

Suspicious Network Activity

Network call of type 'fetch' detected.

Indicator of Compromise

XIOC detected Domain: signingca1.addons.mozilla.org

Indicator of Compromise

XIOC detected URL: https://extension.scanurl.me/scantask/extension_token

Indicator of Compromise

XIOC detected URL: https://extension.scanurl.me/*

Indicator of Compromise

XIOC detected URL: https://www.scanurl.me

Indicator of Compromise

XIOC detected MD5 Hash: 1222130981d54ba347ac3cb6b74fd652

Indicator of Compromise

XIOC detected Domain: data.safe

Indicator of Compromise

XIOC detected Domain: tab.id

Indicator of Compromise

XIOC detected Domain: window.location.search

Indicator of Compromise

XIOC detected Domain: scanurl.me

Indicator of Compromise

XIOC detected Domain: www.scanurl.me

Indicator of Compromise

XIOC detected URL: http://addons.mozilla.org/ca/crl.pem0N

Indicator of Compromise

XIOC detected URL: https://extension.scanurl.me/scantask/extension_check

Indicator of Compromise

XIOC detected Domain: mozilla.com

Indicator of Compromise

XIOC detected Domain: addons.mozilla.org

Indicator of Compromise

XIOC detected Domain: content-signature.mozilla.org

Indicator of Compromise

XIOC detected Domain: t818f4f534be03b3ebac2f9df468dd597.1222130981d54ba347ac3cb6b74fd652.addons.mozilla.org

Indicator of Compromise

XIOC detected Domain: extension.scanurl.me

Indicator of Compromise

XIOC detected Domain: browser.runtime.id

Indicator of Compromise

XIOC detected Domain: date.now

Suspicious Network Activity

Network call of type 'fetch' detected.

manifest-analysis

Potentially sensitive permission 'tabs' declared in manifest.

Suspicious Network Activity

Network call of type 'fetch' detected.

Suspicious Network Activity

Network call of type 'fetch' detected.

Recommended Action

This extension has significant security concerns that warrant careful review. Consider uninstalling or finding a safer alternative. If you must use it, limit the permissions and monitor for suspicious activity.

Analysis performed on 3/9/2026 · Version 2.1

Data sourced from automated security scanning. For detailed analysis, view the full security scorecard.