Why YARA Rules are Better Than Hashes in Malware Detection