Attack transaction

0xd081d6bb96326be5305a6c00dd51d1799971794941576554341738abc1ceb202Block Explorer Link

Profitable contract call to the exploit was made

Attacker gained $587.00

Attack Steps

  1. Funding

    +1.0 BNB
  2. 3 months

  3. Exploit Contract Deployment

  4. 3 hours

  5. Attack Transaction

    +$587.00

Exploit Analysis

FlashloansNo eventsNo tx historyconsole.logSELFDESTRUCTCREATE2
Functions
withdraw()
withdraw(address)
DPPFlashLoanCall(address,uint256,uint256,bytes)
transferOwnership(address)
Events
No events found
External CallTo
transfer(address,uint256)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c
setApprovalForAll(address,bool)0x5eb47c41fc9becf123c9e484c51de37830842add
flashLoan(uint256,uint256,address,bytes)0x6098a5638d8d7e9ed2f952d35b2b67c34ec6b476 (DPP)
balanceOf(address)0x7fe5faf242015cf769ae7fea565b96351dd957a2 (Token)
balanceOf(address)0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c
swapExactTokensForTokensSupportingFeeOnTransferTokens(uint256,uint256,address[],address,uint256)0x10ed43c718714eb63d5aa57b78b54704e256024e (PancakeRouter)
approve(address,uint256)
0x000000440x971d08bba900230298add23e61e04b04226b5073