You should make a back up of the file before trying anything on it
this is always advised just incase something happens.
If you think you know the password you could try decrypt the file and output the contents with
gpg --decrypt recovered_file.gpg > output_file
You could also give this command a go see if there is a secret key for the file
gpg --list-secret-keys
If the file was encrypted with a symmetric cipher (passphrase only, no public/private key),
gpg --decrypt --symmetric recovered_file.gpg > output_file
If you still have no luck you could try export the packets and see if they hold any additional information
gpg --list-packets --verbose recovered_file.gpg > packet_dump.txt
Another good solution is PGPDUMP
pgpdump file -l -i -m- p < options are for showing additinal information from the file >
If you have or can recover the private key associated with the key ID (5EB…)
gpg --decrypt --recipient-key 5EB… recovered_file.gpg > output_file
If you still unsure you could try bruteforce it with gpg2john
gpg2john recovered_file.gpg > hash.txt
john hash.txt
This will convert the GPG file’s passphrase hash into a format compatible with John the Ripper for brute-forcing.
Good luck!