If you have the file but haven't opened it, you can upload it to VirusTotal to see how many antivirus engines flag it as a threat.
Exfiltrate the stolen data to a Command and Control (C2) server. 🚩 Red Flags to Watch For
Because this is likely a credential stealer, change your passwords for sensitive accounts (Banking, Email, Social Media) from a different , clean device.