A Comparison of Clustering Techniques for Malware Analysis