Good you mentioned Linux/OSF.A upfront. Excellent.
Also good to mention it's part of another thread. Excellent...
Apparently when executing an infected binary it'll open a backdoor on TCP/3049 or higher (
Sophos). Running an clean copy of netstat, lsof (-i) or chkrootkit should be able to prove that.
Since you managed to infect your box (as root, right) running untrusted binaries, and you don't know who accessed the system after the infection, I'd suggest you save your
human readable data and reformat and reinstall. Don't save binaries and don't assume you'll get a trusted system back by just copying in clean binaries from cdr w/o the means to verify file integrity (using Aide, Samhain or tripwire incl. databases from floppy or cdr). Please read the 1st thread in the security forum, look for "Steps for Recovering from a UNIX or NT System Compromise", rebuild your box and read the stuff on hardening your boxen. Also there's a supposed cleaner at Packetstorm (search for clean-osf) but again:
don't assume you'll get a trusted system back by just copying in clean binaries from cdr.
HTH