The Invisible Threat: Understanding and Defending Against LOLBINs in Cyberattacks