Attack transaction

0x4f0d8f935eee6608ac38bfc0de9da98254b8e09d1b2ef2f81023f742d5e90287Block Explorer Link

Profitable contract call to the exploit was made

Attacker gained $208.00

Attack Steps

  1. Funding

    +1.0 BNB
  2. 3 months

  3. Exploit Contract Deployment

  4. 3 hours

  5. Attack Transaction

    +$208.00

Exploit Analysis

FlashloansNo eventsNo tx historyconsole.logSELFDESTRUCTCREATE2
Functions
withdraw()
withdraw(address)
DPPFlashLoanCall(address,uint256,uint256,bytes)
transferOwnership(address)
Events
No events found
External CallTo
transfer(address,uint256)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c
setApprovalForAll(address,bool)0x5eb47c41fc9becf123c9e484c51de37830842add
flashLoan(uint256,uint256,address,bytes)0x6098a5638d8d7e9ed2f952d35b2b67c34ec6b476 (DPP)
balanceOf(address)0x7fe5faf242015cf769ae7fea565b96351dd957a2 (Token)
balanceOf(address)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c
swapExactTokensForTokensSupportingFeeOnTransferTokens(uint256,uint256,address[],address,uint256)0x10ed43c718714eb63d5aa57b78b54704e256024e (PancakeRouter)
approve(address,uint256)
0x000000440x971d08bba900230298add23e61e04b04226b5073