Attack transaction

0x23733b755faaf0ecaaff2a5e324bcd085c96b908e1e8c2d45726803f109f7819Block Explorer Link
SATX Incident

Profitable contract call to the exploit was made

Attacker gained $520.42

Attack Steps

  1. Funding

    +1.0 BNB
  2. a month

  3. Exploit Contract Deployment

  4. a few seconds

  5. Attack Transaction

    +$520.42

Exploit Analysis

FlashloansNo eventsNo tx historyconsole.logSELFDESTRUCTCREATE2
Functions
withdraw(address)
fallback()
Events
No events found
External CallTo
transfer(address,uint256)0x55d398326f99059ff775485246999027b3197955 (BEP20USDT)
transfer(address,uint256)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c (WBNB)
swapExactTokensForTokensSupportingFeeOnTransferTokens(uint256,uint256,address[],address,uint256)0x10ed43c718714eb63d5aa57b78b54704e256024e (PancakeRouter)
balanceOf(address)0x55d398326f99059ff775485246999027b3197955 (BEP20USDT)
flash(address,uint256,uint256,bytes)0x36696169c63e42cd08ce11f5deebbcebae652050 (PancakeV3Pool)
approve(address,uint256)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c (WBNB)
swapExactTokensForTokens(uint256,uint256,address[],address,uint256)0x10ed43c718714eb63d5aa57b78b54704e256024e (PancakeRouter)
balanceOf(address)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c (WBNB)
getReserves()
skim(address)
sync()
rescueToken(address,uint256)