msf exploit(windows/persistence/registry_wsl) > set payload payload/cmd/unix/reverse_ssh
payload => cmd/unix/reverse_ssh
msf exploit(windows/persistence/registry_wsl) > exploit
[*] Exploit running as background job 3.
[*] Exploit completed, but no session was created.
[-] Exploit failed: NoMethodError undefined method `>' for nil
Other payloads work fine, so it seems like theres a stray > in payload/cmd/unix/reverse_ssh causing the error