Once executed, it may attempt to contact Command & Control (C2) servers.
Primarily Windows environments where the .rar is decompressed and the internal .js (JavaScript) or executable file is launched. Behavior: TORRE.JS LEAK.rar
Search for the file's hash (if available) on VirusTotal to see detection rates from over 70 different antivirus engines. Once executed, it may attempt to contact Command
You can view the detailed behavior and network analysis of this specific file on the following platforms: TORRE.JS LEAK.rar