A very common, well known way to conceal operations is a method called Capabiliites Diffusion.
This splits out various parts of your tasking and modules.
Xref: Execution Guardrails
https://attack.mitre.org/techniques/T1480/
By following a basic pattern like App Configurations you can start to see how existing patterns work quite well for this.
Allows a single binary to transform based on the configuration its given.
It splits artifacts as well (Horcrux) so that you can exploit the single file bias.
Defenders must have ALL parts or none to analyze.