Inside the ZIP is usually a file like ssxnv1bin7.exe or a script with a double extension (e.g., invoice.pdf.js ).
The archive ssxnv1bin7.zip is used to hide the file extension of the malicious payload from basic email scanners. The Catch (Execution): [rotf.lol 0001cp]_ssxnv1bin7.zip
Forward the email to your IT security team or mark it as "Phishing" in your email client. Inside the ZIP is usually a file like ssxnv1bin7