Providing the website or email source can help determine if this is a known regional scam or a specific technical download.
Zip files are commonly used by cybercriminals to bypass security filters because they can hide various types of malicious content within a single container.
While modern operating systems usually require user interaction to unzip, some exploits attempt to run code as soon as the file is previewed in certain applications. Recommended Security Actions