The sophisticated attack systematically destroys any competing malware before deploying multiple crypto miners and remote-access tools