Hack-Tool:W32/Daij.A is Denial-of-Service (DoS) software designed to continuously submit multiple connection requests to a specified target.
With a large enough number of individuals, this hack-tool could possibly be used to attempt a Distributed Denial-of-Service (DDoS) attack.
The authors of Hack-Tool:W32/Daij.A have designated November 11th as a DDoS attack date.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Hack-Tool:W32/Daij.A is provided by Web sites promoting a global online cyber attack coined as "e-Jihad" or "Cyber Jihad".
This idea has been circulating for some time with the intend to target Western based sites. November 11th, 2007 is reportedly a target date.
This hack-tool arrives as an installer package . The package, by default will be installed in [Program Files]\e-jihad3 directory.
After installation, the following files will be present on the system:
Upon execution, a form will be displayed requesting a Username and Password.
The Interface usually has two buttons. To check its validity the username and password will be submitted to this following location:
If the username and password are valid, it will open the main control interface.
The other button is used for registering a new user and requires the following fields:
The new user registration is then sent to the following location:
Once the logon is successful, the main control interface will then load.
It will initially set the firewall settings to allow the application access through the firewall.
It then retrieves the default proxy setting of the system and uses it as the default value for the target address to attack.
The hack-tool is a simple DoS application that continuously sends multiple connection request to the target specified in the interface.
Besides manually setting the target, the tool will also continuously query:
The query is used to join the DDoS network in order to attack a defined address set by the command and control (C C) server.
For failed attempts and errors, the tool displays an error dialog.
Description Created: 2007-11-09 01:59:14.0
Description Last Modified: 2007-11-09 12:59:02.0