Once installed on the Linux driven machine, the trojan checks for a copy of itself on the machine.

The malware then tries to hide itself by deleting the original launch file.

Both the backdoor and the server use the library zlib to compress the packets they exchange.

Xnote the new multi-purpose backdoor targets Linux servers and converts them into botnets

It also adds a script that will launch it automatically each time after the machine is rebooted.

Once a connection to one of the servers is established, information is exchanged between them in compressed packets.

First, Linux.BackDoor.Xnote.1 sends information about the infected system to the server.

spot_img

It then goes into standby mode and awaits further instructions.

Resource :Dr.Web

Read More

source: www.techworm.net