{"schema":"immunity/antibody-envelope/v1","keccakId":"0x83838c6cd44fdd95af26fbd040e6346bdee780d8525844d942ce9de84c82d86c","immId":"","abType":"BYTECODE","flavor":0,"publisher":"0x4789ddae13d7cbf11aa97d39b201d973d01cbc28","createdAt":"2026-04-29T17:19:43.842Z","reasonSummary":"keccak256 hash of the deployed runtime for the Inferno Drainer template contract. Affiliates redeploy the same template to fresh addresses to evade per-address blocklists, but the runtime hash is invariant under EIP-170 deploy mechanics. SlowMist's Q4 2024 tracking links the hash to dozens of attributable victim incidents. MALICIOUS at high confidence; a bytecode match is a stronger primitive than an address match because it survives address rotation.","matcher":{"kind":"bytecode","bytecodeHash":"0x9c4f8a2b3c4d5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d3e4f5a6b7c8d9e0f"}}