Analysis of the ‘Le Bao’ Fraudulent Chat Application Used for Pornographic Promotion

This report provides a comprehensive technical analysis of the malicious "Le Bao" app that masquerades as a WeChat‑like chat tool, detailing its sample characteristics, hidden QR‑code group joining mechanism, payment flow, server‑side tracing, and profit model, highlighting its covert distribution of pornographic content and associated illicit activities.

Top Architect
Top Architect
Top Architect
Analysis of the ‘Le Bao’ Fraudulent Chat Application Used for Pornographic Promotion

Background: The security lab detected a counterfeit application named "Le Bao" that appears as a chat software resembling WeChat but actually promotes a pornographic website. Users must scan a specific QR code to join a group where illicit content is shared, making detection difficult.

1. Sample Characteristics

1.1 Imitates WeChat Interface

The app mimics WeChat’s UI, allowing users to register, receive a random ID, and add friends for chatting.

Add friend and chat function
Add friend and chat function

When a user inputs a friend ID, the client sends it to the server, which returns the friend's account and avatar information for display.

Friend data transmission
Friend data transmission

1.2 QR‑Code Group Joining for Pornographic Live Streams

The app requires scanning a special QR code to join a group; only the app’s built‑in scanner can decode it, rendering the content invisible to standard WeChat scans.

QR code and group backend
QR code and group backend

Scanning with WeChat or a camera fails, as the app uses a proprietary decoding method.

WeChat and camera scan results
WeChat and camera scan results

The app extracts the group ID from data prefixed with "##" (e.g., "##mWII6O3").

1.3 Membership Payment to Access Pornographic Live Streams

After joining the group, users are prompted by agents to purchase a membership, which grants access to the pornographic website’s live streams.

Chat records
Chat records

The website also integrates online gambling and offers small‑amount payments (e.g., 10 CNY) to view streams.

2. Promotion Methods

2.1 Traditional Promotion

Typical pornographic software spreads via file sharing, web pages, forums, malicious plugins, and agent networks.

Traditional promotion methods
Traditional promotion methods

2.2 Updated Promotion

The "Le Bao" app hides its true purpose by appearing as a normal chat tool, then directs users to download the malicious APK and join hidden groups.

Promotion website
Promotion website

3. Profit Model

The app generates revenue through platform‑taken commissions from live stream hosts, membership fees, and facilitating illicit services such as online prostitution and gambling.

Profit flow
Profit flow

4. Traceability Logic Diagram

The analysis traces the app’s server addresses, download links, payment methods, and social accounts.

Traceability mind map
Traceability mind map

5. Intelligence Mining Extensions

5.1 Server Address Tracing

Most server responses contain a URL (e.g., http://ro8***oud-image.ro***ub.com/) that hosts user avatars and pornographic images.

Server response data
Server response data

The domain is registered to a Beijing‑based instant‑messaging cloud service provider that supplies an SDK with lax content moderation.

5.2 Payment Tracing

The site supports bank cards, Alipay, and WeChat Pay, but only a few bank cards are actually usable.

Small‑amount Alipay payment
Small‑amount Alipay payment

Large‑amount payments involve corporate accounts and personal Alipay accounts.

Large‑amount payment
Large‑amount payment

5.3 Social Account Tracing

A customer service QQ account (166***1688) was identified, showing a location in Taiwan.

QQ information
QQ information

6. Summary

The illicit pornographic promotion app employs a unique QR‑code decoding and group‑joining mechanism, making it highly covert. It monetizes through membership fees, live‑stream commissions, and ancillary services, representing a novel and large‑scale threat that requires intensified monitoring and rapid takedown.

7. Prevention and Response Recommendations

Block malicious domains and URLs.

Blacklist the app’s internal domain usage.

Increase monitoring to ensure immediate blocking upon detection.

Educate users to recognize and avoid such deceptive applications.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Information Securitymalware analysisthreat intelligencepayment tracingpornographic app
Top Architect
Written by

Top Architect

Top Architect focuses on sharing practical architecture knowledge, covering enterprise, system, website, large‑scale distributed, and high‑availability architectures, plus architecture adjustments using internet technologies. We welcome idea‑driven, sharing‑oriented architects to exchange and learn together.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.