Inside the Fake WeChat App That Promotes Porn: Hidden Mechanics Unveiled

Security researchers dissect the counterfeit “Le Bao” app that mimics WeChat, revealing its covert QR‑code group‑joining, custom decoding, member‑paid porn livestreams, embedded payment methods, server infrastructure, and illicit profit models, highlighting its high concealment and the need for aggressive mitigation.

Java Backend Technology
Java Backend Technology
Java Backend Technology
Inside the Fake WeChat App That Promotes Porn: Hidden Mechanics Unveiled
Background: Recently, the Shadow Security Lab detected a counterfeit app named “Le Bao” that appears as a WeChat‑like chat software but actually promotes pornographic websites.

The app requires users to scan a specific QR code to join a group where porn live streams are hosted, making detection difficult and evading typical investigative methods.

This article discloses the app’s propagation methods, profit model, traceability analysis, and intelligence mining.

Operation flowchart
Operation flowchart

1. Sample Characteristics

1.1 Fake WeChat Interface, Packaged as Chat Software

The app imitates the WeChat UI; after registration it generates a random ID, allowing users to add friends and chat.

Add friend and chat function
Add friend and chat function

When a user inputs a friend ID, the client sends it to the server, receives the friend's account and avatar information, and displays it.

Friend data transmission
Friend data transmission

1.2 Specific QR‑Code Scanning to Join Groups for Porn Live Streams

The app only grants access to pornographic live streams after scanning a particular QR code; standard WeChat scanning cannot join the group, providing high concealment.

Scanning the QR code adds the user to a group that has grown to over 2,400 members.

Group QR code and backend
Group QR code and backend

Standard WeChat or camera scanning fails to join the group:

WeChat and camera scan results
WeChat and camera scan results

Code analysis shows the app uses a proprietary decoding method for covert propagation:

Decoding code
Decoding code

After scanning the QR code, the app checks for data prefixed with “##”; the string after “##” is the group name (e.g., “##mWII6O3” indicates group ID mWII6O3).

The app then contacts a specific URL to query group membership:

Group join request
Group join request

After receiving group info, it confirms joining via another endpoint:

Confirm group join
Confirm group join

1.3 Membership Recharge to Watch Porn Live Streams

The app itself does not provide live streaming; after joining the group, the group owner shares a business ID for users to purchase a membership, which then grants access to a porn website’s live streams.

Chat record showing membership
Chat record showing membership

The porn site also integrates online gambling; a 10‑yuan recharge allows users to watch live streams.

Website address: https://www.1****0.com/

Porn website screenshot
Porn website screenshot

The site also displays fake lottery winnings to lure users into online betting:

Lottery winning page
Lottery winning page

Furthermore, the creators use the app to recruit agents for arranging prostitution; agents receive a commission from the platform’s earnings.

Agent recruitment and prostitution
Agent recruitment and prostitution

2. Promotion Methods

2.1 Traditional Promotion

Traditional porn software spreads via cloud storage, websites, forums, third‑party ad plugins, malicious background downloads, and recruiting downstream agents.

Traditional promotion methods
Traditional promotion methods

2.2 Updated Promotion

The app’s covert promotion leverages network distribution to attract users to download the APK.

Distribution address: http://h****9.org/

Promotion website
Promotion website

The app’s concealment lies in:

The app appears as an ordinary chat tool.

Users cannot access porn content without scanning the specific QR code.

Agents can easily manage users and post illicit recruitment messages, with chats containing sensitive information.

Publishing porn content
Publishing porn content

3. Profit Model

The app’s revenue streams include host commissions, membership fees, and prostitution‑related earnings, with embedded gambling to further monetize users.

Profit model diagram
Profit model diagram

1) Hosts use the platform for porn live streams; the platform takes a fee.

Platform fee from live streams
Platform fee from live streams

2) Users must purchase a membership to watch porn live streams.

Membership payment
Membership payment

3) The platform publishes notices to arrange prostitution for profit.

Prostitution notice
Prostitution notice

4. Traceability Logic Diagram

The analysis traces server addresses, download links, distribution channels, payment methods, and social accounts.

Traceability mind map
Traceability mind map

5. Intelligence Line Mining System Expansion

5.1 Server Address Trace

Most illegal sites host servers abroad with strong concealment; no concrete information was found from the traced addresses.

Server address list
Server address list

Server responses often contain a URL such as http://ro8***oud-image.ro***ub.com/ where avatars and porn images are fetched.

Server response data
Server response data

Example porn images retrieved from the server:

Porn image from server
Porn image from server

Domain registration shows the provider “Beijing *** Xin Network Technology Co., Ltd.” offering an instant‑messaging SDK with lax content review.

Domain registration info
Domain registration info

The assistant ID used by a host reveals a phone number (1356***6666) still active in Sichuan.

Assistant phone number
Assistant phone number

5.2 Payment Trace

The porn site integrates multiple payment methods, currently supporting bank cards, Alipay, and WeChat Pay.

Payment methods
Payment methods

5.2.1 Bank Card & WeChat Pay

Only three bank cards are listed; the site does not actually open bank or WeChat transfer functions, but users can transfer via bank apps.

Bank and WeChat transfer
Bank and WeChat transfer

5.2.2 Alipay Small‑Amount Payments

Small payments use account 159***17660 (recipient: Wang *Long).

Small Alipay payment
Small Alipay payment

5.2.3 Alipay Large‑Amount Payments

Large payments use account gd***[email protected] (recipient: Yong’an City ** Street He *Yi Store).

Large Alipay payment
Large Alipay payment

5.3 Social Account Trace

During a chat with customer service, a QQ account (166***1688) was obtained; the QQ space shows the user residing in Penghua County, Taiwan.

QQ account information
QQ account information

6. Summary

The illegal porn promotion app employs a unique decoding and group‑joining mechanism, offering high concealment that thwarts typical investigative techniques. It scales via paid memberships, massive user bases, and embedded gambling, constituting serious criminal activity. Continuous monitoring and rapid response are essential to curb its spread.

7. Prevention and Handling Recommendations

Block malicious distribution addresses.

Block domains used within the app.

Increase monitoring to ensure immediate blocking upon detection.

Educate ordinary users to recognize such deceptive apps and adopt proactive security measures.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

information securitytraceabilitymalware analysiscybercrimemobile app securitypayment fraud
Java Backend Technology
Written by

Java Backend Technology

Focus on Java-related technologies: SSM, Spring ecosystem, microservices, MySQL, MyCat, clustering, distributed systems, middleware, Linux, networking, multithreading. Occasionally cover DevOps tools like Jenkins, Nexus, Docker, and ELK. Also share technical insights from time to time, committed to Java full-stack development!

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.