The name of one of the scammers who at least participated in the withdrawal of funds:
- ETH-address: 0x3149808a014eEe4179F26b02D01Ed589155d8d3F
- ETH-address # 2: 0x2E8c05d9AA4A41c2128984095675a1BEfe75Ce27
- Telegram UserName: @bale123
- https://bitcointalksearch.org/user/lymanhhung-2655444
- https://www.youtube.com/channel/UCRaVTp5O0BYNSXsFF1_Ox0g
- Presumably, this swindler is a resident of the Aland Islands.
Also, the fraudster who was involved in cashing out funds has some fake accounts, such as:
- Telegram UserName: @JockerMr (fake)
- https://twitter.com/Quynhnh14865883 (fake)
- https://www.facebook.com/hoanglinhls1996 (fake)
In fact, this confederate of the scammers (or the fraudster itself) is most likely a former bounty hunter. Rather, he was tired of the hard work of an honest bounty hunter and, therefore, he first started using fake accounts and other people's work, which also did not bring him the desired benefit. After that, he decided to commit criminal offenses and became involved in fraudulent projects, or perhaps organize these fraudulent projects.The wallet 0xE6Fa4C9D105C7cDb6C562bA0caF70b9135c3E4Cb that created the Smart Contract for the Pisces.Finance token (PIS) has only two incoming ETH transactions:
1. Transaction that originated from the Binance exchange and laid the foundation for the 0xE6Fa4C9D105C7cDb6C562bA0caF70b9135c3E4Cb wallet. Such manipulation makes it possible to hide, since only law enforcement agencies have to request personal information about the user of the Binance exchange.
2. Transaction originating from wallet 0x3149808a014eEe4179F26b02D01Ed589155d8d3F, with some financial support, in the amount of 0.05 ETH. This scammer needed little funds to complete the transactions. This time, he didn’t use Binance to save money or time, rather than revealing himself.
YouTube
https://www.youtube.com/channel/UCRaVTp5O0BYNSXsFF1_Ox0g(
https://www.youtube.com/watch?v=8GrablUKrr0) - This wallet address 0x3149808a014eEe4179F26b02D01Ed589155d8d3F is indicated in the commentary to this video.
(
https://www.youtube.com/watch?v=84xolgv1SGo) - This wallet address 0x3149808a014eEe4179F26b02D01Ed589155d8d3F is indicated in the commentary to this video.
The main page
https://pisces.finance/ has the following inscription:
"Please send your ETH to our Private Sales Address below: Our Private Sale Wallet Address: 0xba332224a289358901e613892F90d989f3e3ea31"
Now let's look at the address 0xba332224a289358901e613892F90d989f3e3ea31 ...
23 days ago, the owner of this address sent all their 6.498278 Ether to the third-party wallet address 0xd897d9756848c42076C91639B6008Fb3cAa98F8b. After that, he split this amount into other smaller transactions for other wallet addresses.
Further, he sent another large transaction 6.0045 Ether to the address 0xf95de55bcdfc1e02b9a843a14aa6bdba511141d3. Then he again made some breakdown into small transactions, as well as one larger 5 Ether transfer he sent to the smart contract address 0xB5564feb808b817896CB978cc85e787cfE244C43. The smart contract address 0xB5564feb808b817896CB978cc85e787cfE244C43 is used very rarely, so we can see the output:
https://etherscan.io/tx/0xd426b8c685c96cb3f3d0329f4ff3cef3ece10cc981b0de81fbea951309a44b26 exchange for another cryptocurrency.
After using Bitcoin Suisse, the scammer made a withdrawal:
https://etherscan.io/tx/0x73bb862f5b57f5f7fd91ecb112d885110a33d169969cacc3f1da0c7077296f51After that, the fraudster made a transaction:
https://etherscan.io/tx/0xda91736a96bcc23961592a10d07754fe10e57b70111f66e10c939d7a3cf3c900Subsequently, the scammer sent the laundered 5 ETH to the Binance exchange:
https://etherscan.io/tx/0xd077e23a70aeffca2539d1b4ff2dfaa16a9d5e7bf75d576f8f089c151d73f1ef