Looks like Trojan:Script/Wacatac.H!ml is a legitimate Trojan according to the Google, but I'm no tech wizard
The !ml at the end means it was picked up by defender's heuristic analysis module (so called because they wrote it in ML.net), so it's not so much a known trojan but rather something defender thinks
looks like a trojan.
Sometimes that means it's just a false positive, other times it's legitimately something new that defender is spotting despite not having a signature for it. Things that can set it off is usually behaviour like checking to see if you're running in a VM, fucking with Windows settings, executing heavily obfuscated code etc.
There are sites that will do automated dynamic analysis, where they basically execute the .exe and watch what it does, but it's hit and miss and you still need to be able to read and understand the results.
You must be registered to see the links
but you need to submit the executable, not just the rar file, else it will just scan the contents.