Crypto ml

Comment

Author: Admin | 2025-04-28

Example of research based on the investigation of activity of Russian money laundering telegram-service @FAST_CLEAN_BTC_BOTby investigation team of Match Systems Activity of Russian money laundering telegram-service @FAST_CLEAN_BTC_BOT (hereafter — ML-bot) started right after April 06, 2022 - day when HYDRA darkmarket servers were arrested by law enforcement agencies.ML-bot started from the beginning aggressive advertising with a focus on money laundering functions of it. Counterparties (direct and indirect connections) of ML-bot are different Russian darkmarkets: OMG!OMG!, BlackSprut, MEGA and others. The bitcoin-cluster of ML-bot (root-address 18oxDVbE9BDNn1LLdy5CGAP7HUr4fGVFBT) includes >200 addresses and it received >4100 transactions for total amount >180 BTC. Following crypto-exchanges deposit addresses involved in money laundering process have been identified as a result of research:• Binance: 16qT6urvhRmVARFVsV5sJKXjuW5ZiLrvG1 (25.34 BTC);• KuCoin: 3GgCzgj2qR8neutTkiyMeuVDVxHrfd8xe6 (9.24 BTC);• Huobi: 17DCLX55J3TTh58NsvdtkRmWWCBKjdcfaq (29.78 BTC);• FTX: 3ETFogh6AqY4t6ofjqQuNiQUifjeDypkGM (24.94 BTC);• Kraken: 3PHLr246vZ2GQRW2dAHE73Szm2wMShKiSG (22.37 BTC);• OKX: 3M27WCf8UTxpaHkuGiSvqKkJ6smeLAaLCX (2.33 BTC);• Gate: 1ac7ycZJt8CAfHhTpD2YHJwdVLBUHR3kT (22.52 BTC);• MEXC: 3NVjqGeJLn5JmmQjDaDoiZV98wY6MRsYm4 (3.41 BTC);• Wisenex: 34bBha2WgYQArXCdYyvprJjfBaxH8A4Xay (14.53 BTC).Transactions from crypto-exchanges to these addresses can help to identify manager of ML-bot:• 1N3NbYPSEhgy7A27P6d5wS5bXeCfWEXxka (BTC);• TJQh8iEvZMj48p9atwmzB7F7aCySwpQSKW (TRC20). ML-bot uses mint-burn cycle on RenBTC DEX for laundering of criminal assets of users, after which laundered assets transfer to CEX and after it clean BTC transfer to users.According to the description of ML-bot, assets are issued from previously laundered money and direct connections are obfuscated but cluster analytic gives an overall view. 2. OUTCOMES OF THE RESEARCH Thus, we’ve got the BTC-address of ML-bot: 1B1XnbaDUehX2B1hH77kBj9JFzW1g4Jn2P. investigation team of MatchSystems contacted ML-bot. 3. PRIMARY DATA COLLECTION investigation team of MatchSystems sent BTC to the addressof ML- bot (1B1XnbaDUehX2B1hH77kBj9JFzW1g4Jn2P)from the our address (bc1q6efxz3q6w9983tqm7m6p3yhu59h062r6a53wc9)via transaction ID: 0c04c2bcf32c56511bb020468fcb2a6e46ce010de293069c63afd4509697da7d investigation team of Match Systems sent BTC to the addressof ML- bot (1B1XnbaDUehX2B1hH77kBj9JFzW1g4Jn2P)from the our address (bc1q6efxz3q6w9983tqm7m6p3yhu59h062r6a53wc9)via transaction ID:0c04c2bcf32c56511bb020468fcb2a6e46ce010de293069c63afd4509697da7d 1N3NbYPSEhgy7A27P6d5wS5bXeCfWEXxka TJQh8iEvZMj48p9atwmzB7F7aCySwpQSKW;• e971687765fc4edb2180d3e716ee73fa7af7fd5710fb7d5a0181e5c38ac9ba02 (TRC20) — from the address 9960308cd7ea7ab9dc3bfc5ccefa4d35733598f86d66d1b3fff07ebe921a898a receiving “cleaned” coins. The following transactions were received on the

Add Comment