If you are a researcher, you can upload the file to a service like VirusTotal to check its signature against multiple security engines without risking infection [4].
These files are often sent via emails masquerading as "Unpaid Invoices," "Shipping Notifications," or "Account Statements" to trick the recipient into opening them [1, 2].
Avoid extracting the contents of the archive, as this is the primary way the malware is triggered.
If you are a researcher, you can upload the file to a service like VirusTotal to check its signature against multiple security engines without risking infection [4].
These files are often sent via emails masquerading as "Unpaid Invoices," "Shipping Notifications," or "Account Statements" to trick the recipient into opening them [1, 2].
Avoid extracting the contents of the archive, as this is the primary way the malware is triggered.