{"schema":"immunity/antibody-envelope/v1","keccakId":"0xa4701be19afe34b26b15ae80c18302eb7eccfb08ef94aece334f70d8c0160d43","immId":"","abType":"BYTECODE","flavor":0,"publisher":"0x4789ddae13d7cbf11aa97d39b201d973d01cbc28","createdAt":"2026-04-29T17:22:14.885Z","reasonSummary":"Runtime hash of the contract used in the June 2023 Atomic Wallet drain. Elliptic's 2023 incident report attributes the operation to the DPRK-aligned Lazarus Group based on chain-hopping signatures and prior-incident overlap. The bytecode hash is the most durable primitive for this incident because the operators frequently reuse runtime artifacts across redeployments. MALICIOUS verdict mirrors both the incident attribution and the sanctioned-actor designation.","matcher":{"kind":"bytecode","bytecodeHash":"0x3c4d5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d3e4f5a6b7c8d9e0f12345abc"}}