Based on common cybersecurity threat intelligence and file-naming conventions, is highly likely to be a malicious file [1].

Tools designed to give attackers full control over a victim's computer.

If you've already opened or extracted the file, please tell me:

If you received this via email, mark it as phishing/spam and delete it.