Unveiling and mitigating common pitfalls in malware analysis