Phishing / Crypto Wallet Drainer - psyopanime.net

Cloned phishing site targeting Solana users. Injects IPFS-hosted wallet drainer.

Domain: psyopanime.net
Malicious behavior:

  • Loads drainer via /secureproxy?s=%2Fipfs%2F_qEVAUVavvzeiYiasp2KRw7531dfc2b686e4c47507eec9adb88115

  • Strips href attributes from links to intercept clicks

  • Registered 2026-01-13 via Nicenic (CN), Cloudflare NS

    Proposed rule:

alert tls $HOME_NET any -> $EXTERNAL_NET any (msg:"ET PHISHING Psyopanime Crypto Drainer Domain in TLS SNI"; flow:established,to_server; tls.sni; content:"psyopanime.net"; nocase; classtype:trojan-activity; sid:XXXXXXX; rev:1;)
1 Like

Hi @tetsuoai, thank you for the heads up on this. I’ll provide an update when the rules are released.

Cheers,

:hotdog:

1 Like

Update. The following rules were released today:

2066784 - ET PHISHING Wallet Drainer CnC Domain in DNS Lookup (psyopanime .net) (phishing.rules)
2066785 - ET PHISHING Observed Wallet Drainer Domain (psyopanime .net in TLS SNI) (phishing.rules)
2066758 - ET PHISHING IPFS Resource Executing from Memory Defined Script Tag (phishing.rules) # Covers the injector code where ipfs is statically present in landing page.
2066788 - ET INFO Landing Page Executing Memory Defined Script Tag (info.rules) # Similar to rule above, but drops the ipfs content to match on other landing pages. Under category INFO instead of PHISHING for False Positive reduction purposes.

Cheers

1 Like