Skip to main content
Malware Investigation: NetSupport RAT Pokemon Phishing Campaign operation cover
IntermediateSIEMXDRFirewallPRO

Malware Investigation: NetSupport RAT Pokemon Phishing Campaign

Investigate a sophisticated phishing campaign where threat actors distributed the NetSupport Remote Administration Tool (RAT) by disguising it as a popular Pokemon card game. You will analyze the infection chain from the initial web download through persistence mechanisms and command-and-control configuration using SIEM, XDR, and Firewall logs.

45m
5 tasks
160 points
Pro

Start this operation

Requires a Pro subscription.

View Pro Plans

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Identify the Initial Phishing Domain

20
SOC{domain.name}Hint available
2

Analyze the Dropper Execution

30
SOC{md5_hash}Hint available
3

Investigate Brute Force Origin

35

Identify the source IP address used by the attacker to successfully breach the executive workstation via RDP after multiple failed attempts.

SOC{...}Hint available
4

Extract C2 Configuration

40
SOC{c2_domain}Hint available
5

Identify Masquerading Binaries

35
SOC{filename.exe}Hint available

5 tasks · 160 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
Firewall log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Intermediate

Requires foundational alert triage skills. Multiple data sources to correlate.

Prerequisites

  • Basic understanding of security alerts
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts
  • Familiarity with Firewall concepts

Ready to investigate?

This operation requires a Pro subscription.

View Pro Plans

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more