Use tools like Cisco Talos Intelligence to see if the file's unique signature has been flagged by other researchers.
A high-level overview of whether the file is safe or malicious.
Encrypts your personal files and demands payment for their release.
If you have encountered this file, do not open it. Instead, perform the following:
Upload the file to an automated sandbox like VirusTotal or Joe Sandbox to generate your own "solid report" on its behavior.
What is a Cybersecurity Report and How to Create It? - SentinelOne