Text this: Identifying Malicious Code Through Reverse Engineering