Yeah, it's another one of those nested compression challenges. Inside of the zip is a gzip compressed file, which has a compressed file of a compressed file, etc. etc. etc.
Anyway, all of the archive types it uses are extractable using 7z e
So I just used a script to continuously extract the current archive and then remove it until it could not be extracted anymore. Then, you can simply cat the last file left to get the flag, flag{the_answer_is_1548_licks}
NOTE: My script was called popper.py, you'll have to replace popper.py in the script with whatever you call your script.
We get a shell, and get the output in large ascii text. There's a PNG of the flag. Here's my script (stupid probably). I got 1/3 of the image and guessed the rest lol
OH MY GOD I COULD HAVE CHEESED IT
ONLY STDOUT IS ASCII-ARTED
SO
base64 -w0 flag.png 1>&2
FUCKING YEAH DOES IT REEEEEEEEEEEEEEEEEEEEEEEEEE