Hackers Use FUD Crypt to Generate Microsoft-Signed Malware With Built-In Persistence and C2