There are various techniques for obfuscating the malicious code. In this case, the functions and payload parts are split into several variables which are combined in order to prevent easy reading of the malware.
Anything can be encoded by this method, a backdoor, a spam injection tool, a credit card stealer or a crypto-miner.
Severity
HIGH