Generating YARA Rules by Classifying Malicious Byte Sequences