UDP backdoor which uses raw sockets. It spoofs the packets origin address when communicating with the server end of the backdoor. It also uses encryption, and has several methods of security through obscurity.
c84875544294e85bde768b70f200475f01b28053bea5c7a746232b3cfa5fdda3