If you have encountered this file, do not open it. Instead, perform the following:

Designed to steal browser passwords, cookies, and cryptocurrency wallet data.

Use tools like Cisco Talos Intelligence to see if the file's unique signature has been flagged by other researchers.

Information such as the file's hash (MD5/SHA256), size, and embedded strings.