Back to reports
highPhishing

GoldFX: One APK Hash, Five Domains, and a Chinese Crypto Fraud Operation Running on Alibaba Cloud

PublishedMarch 12, 2026
Threat Actors:fingerprint. The operation is LIVE as of March 11, 2026.ProfileAssessmentTimelines will likely register new domains
phishingsocial-engineeringc2apt

TL;DR: A single Android APK hash on MalwareBazaar -- a WebView trojan disguised as a crypto trading app called "GOLDFX" -- led to the discovery of a 5-domain Chinese-operated investment fraud operation with live infrastructure, parallel redundant platforms, and dual Android/iOS targeting. All five domains were registered on the same day (January 31, 2026) through the same registrar (Gname.com), share the same Cloudflare nameserver pair, and back into the same RuoYi v3.8.5 admin framework. The operator left a trail of attribution artifacts: the developer namespace com.bobo.test leaked from a test build, Chinese-language comments embedded throughout the JavaScript, a build timestamp baked into the APK certificate, Ximalaya (Chinese audio platform) SDK references, and assets stored on Alibaba Cloud OSS in Singapore. The APK has a 15.8% antivirus detection rate and the entire operation -- including the live APK download endpoint at gfdluni[.]top/app.apk -- remains fully operational as of March 11, 2026. This is a textbook pig butchering operation: social engineering on messaging apps, a convincing fake trading interface, and infrastructure designed to steal deposits while collecting victim location data and device fingerprints.


From a Hash to a Fraud Network in One Pivot

Most crypto fraud operations are discovered through victim reports or ad fraud detection. This one started with a hash.

On March 10, 2026, a researcher named "jitesh" from India uploaded an Android APK to MalwareBazaar. It was tagged as a trojan and dropper, with a paltry 12 out of 76 antivirus detections. The file was 5.1MB, packaged under com.nuiy.uuxe, and called itself "GOLDFX" -- a name that screams fake investment platform.

The APK itself was a WebView wrapper -- essentially a thin Android shell that loads a web-based trading platform. That is not unusual for scam apps. What was unusual was how much the operator left exposed. Pulling the thread from the APK's hardcoded URL (gfxuni[.]top) led to the discovery of five domains, ten subdomains, parallel redundant platforms, an unauthenticated configuration API, a Chinese admin framework with the CAPTCHA disabled, and an Alibaba Cloud storage bucket named "lbma" -- likely a nod to the London Bullion Market Association, because even fraud operators have aspirations.

What Was Found vs. What Was Known

AspectPrior ReportingOur Findings
Infrastructure1 sample on MalwareBazaar, no C2 analysis5 domains, 10+ subdomains, Alibaba Cloud storage
C2 DomainsUnknowngfxuni[.]top -> goldfxbb[.]com + goldfxee[.]com (parallel platforms)
Download InfrastructureUnknowngfdluni[.]top actively serving APK + iOS mobileconfig
Backend TechnologyUnknownRuoYi v3.8.5 (Chinese admin framework), Spring Boot/Java API
Platform CapabilitiesTagged "trojan" + "dropper"Full fake trading platform: deposit, withdraw, copy-trade, IEO, NFT
Attribution IndicatorsNoneDeveloper namespace "com.bobo.test", Chinese-language comments, Alibaba Cloud
iOS TargetingUnknownSigned mobileconfig Web Clip targeting iOS users
Detection Rate12/76 (15.8%)Confirmed low detection -- most AV engines do not flag it

The Attack Chain: From WhatsApp to Wallet Drain

[1. Victim Discovery]
    Social engineering via messaging apps (WeChat, WhatsApp, Telegram)
    Romance scam / crypto investment group / "insider tips"
         |
         v
[2. Distribution Gateway]
    gfxuni[.]top -- landing page with Chinese text
    JavaScript detects mobile UA, redirects to /1.html
    WeChat browser detection (micromessenger check)
         |
         v
[3. App Download]  (gfdluni[.]top)
    Android: /app.apk  --> WebView trojan (5.1MB)
    iOS: /app.mobileconfig --> Signed Web Clip profile
         |
         v
[4. Fake Trading Platform]
    h5.goldfxbb[.]com (victim-facing frontend)
    webapi.goldfxbb[.]com (Spring Boot API backend)
    Fake market data, deposit/withdrawal, copy trading, IEO
    GPS location tracking, device fingerprinting
         |
         v
[5. Operator Control Panel]
    bitadmin.goldfxbb[.]com (admin dashboard)
    adminapi.goldfxbb[.]com (RuoYi v3.8.5, CAPTCHA disabled)
    Manages victim accounts, controls fake market prices
         |
         v
[6. Redundant Backup]
    goldfxee[.]com mirrors entire goldfxbb[.]com structure
    Same subdomains: h5, webapi, adminapi, bitadmin
    Instant failover if primary gets taken down

The operation targets both Android and iOS users. Android victims get a full WebView trojan APK that wraps the trading platform. iOS victims receive a signed .mobileconfig profile that installs a Web Clip -- essentially a home screen shortcut that looks and behaves like a native app but loads the web platform. Both paths funnel victims into the same fake trading interface.

The landing page at gfxuni[.]top includes a check for the WeChat browser user agent string (micromessenger), which tells us that at least some victim traffic is expected to arrive via WeChat links -- a common distribution vector for pig butchering operations targeting Chinese-speaking victims and the broader Southeast Asian diaspora.

Infrastructure: Five Domains, One Operator, Zero Doubt

All five domains share a registration pattern that makes unified ownership trivially provable.

DomainIPs (Cloudflare)RegistrarCreatedNS PairPurpose
gfxuni[.]top104.21.31.84, 172.67.175.127Gname.com2026-01-31demi/georgeDistribution gateway
goldfxbb[.]com172.67.185.5, 104.21.84.21Gname.com2026-01-31demi/georgePrimary platform
goldfxee[.]com172.67.128.210, 104.21.2.60Gname.com2026-01-31demi/georgeBackup platform
gfdluni[.]top104.21.33.242, 172.67.193.251Gname.com2026-01-31demi/georgeAPK/config download
igmails[.]vipN/AUnknownUnknownnitin/sandraComplaint email domain

Same registrar. Same registration date. Same Cloudflare nameserver pair (demi.ns.cloudflare.com / george.ns.cloudflare.com). A shared NS pair means a shared Cloudflare account, which means a single operator controlling all four primary domains. The fifth domain (igmails[.]vip) is used for the "complaint email" address displayed on the platform -- a touch of legitimacy theater.

Behind Cloudflare, the backend runs Java/Spring Boot for the API layer (confirmed by Java stack traces in 500 error responses -- always test your error handling, folks) and RuoYi v3.8.5 for the admin interface. RuoYi is a Chinese open-source admin framework built on Spring Boot, and every error message it produces is in Chinese. It is the equivalent of finding a WordPress installation with Chinese language packs -- not definitive attribution by itself, but a strong signal when combined with everything else.

Cloudflare (CDN/WAF)
  |
  +-- demi.ns.cloudflare.com / george.ns.cloudflare.com
  |   (shared NS pair = single Cloudflare account)
  |
  +-- gfxuni[.]top (distribution gateway)
  +-- goldfxbb[.]com (primary trading platform)
  +-- goldfxee[.]com (backup trading platform)
  +-- gfdluni[.]top (APK/mobileconfig download)
  |
  +-- Origin Server(s) -- unknown, behind Cloudflare
      +-- Java/Spring Boot (webapi -- 500 errors with Java traces)
      +-- RuoYi v3.8.5 (adminapi -- Chinese admin framework)
      +-- Vue.js SPA (h5 frontend, bitadmin panel)
      |
      +-- Alibaba Cloud OSS (Singapore) -- asset storage
          Bucket: lbma.oss-ap-southeast-1.aliyuncs.com

The APK: A Trojan That Tracks Your GPS

PropertyValue
SHA-25631b0624d16882eec282adc3817b18e4c8b3c80a9dbaa82e057a902cf7a27732b
MD51ff84128a336abc72a3c2944608dd952
Packagecom.nuiy.uuxe
App NameGOLDFX
Version6.0
Min SDK23 (Android 6.0)
Target SDK32 (Android 12L)
Build ToolsKotlin 1.8.20, Gradle 7.2
VT Detection12/76 (15.8%)

The APK is more than a simple WebView wrapper. The application architecture includes:

  • H5Activity: Full-screen WebView that loads https://gfxuni[.]top on launch
  • JSBridge Framework (com.smallbuer.jsbridge): Two-way bridge enabling the web frontend to invoke native Android capabilities -- this is how the web app can request GPS coordinates and device info
  • LocationUtil with MyLocationListener: Custom GPS tracking implementation that collects victim coordinates
  • OkHttpHelper.initTrustManager: Custom TrustManager that disables SSL certificate validation -- the app will trust any certificate, making it trivial for the operator to intercept and modify traffic
  • NetworkStateReceiver: Monitors network changes, likely to detect when the victim switches networks
  • HistoryDatabase (com.bobo.db.HistoryDatabase): Room database that stores browsing history using the developer's leaked test namespace

The SSL bypass is particularly concerning. With certificate validation disabled, all victim traffic -- including login credentials and financial information -- flows through connections that an intermediary could intercept without triggering any security warnings in the app.

Developer Fingerprints: "Bobo" Left the Lights On

ArtifactValueSignificance
Developer namespacecom.bobo.testLeaked test package name -- "bobo" is Chinese slang/nickname
Cert timestamp1769868794059 (ms)Embedded in O and OU fields = 2026-01-31T14:13:14Z
Cert CNqymiPossibly initials or alias
Build toolsKotlin 1.8.20, Gradle 7.2Android Studio 2023+
Chinese comments"dynamic refresh JS", "generate 4-digit random", "website under construction"Native Chinese speaker
Adobe Photoshop"Adobe Photoshop 2025 Macintosh"Icon created on macOS
Ximalaya referenceXimalayaKotlinChinese audio platform SDK

The com.bobo.test namespace is the most valuable attribution fingerprint. This is a developer test namespace that was never cleaned from the production build -- the Room database class com.bobo.db.HistoryDatabase still references it. "Bobo" is a common Chinese colloquial name or nickname, and its presence in a test namespace suggests a Chinese developer who builds and tests under their personal identifier.

The APK signing certificate contains a Unix timestamp (1769868794059 milliseconds) embedded in both the Organization and Organizational Unit fields, resolving to January 31, 2026, 14:13:14 UTC. Cross-referencing with the domain registration timeline, this means the APK was signed approximately three hours after the domains were registered -- the entire operation from domain purchase to APK deployment happened in a single afternoon.

The certificate itself has a 50-year validity window (2026 to 2076). Legitimate app certificates are typically valid for 25-30 years. Fifty-year validity is a common indicator of automated or malware-related certificate generation.

Nine Indicators of Chinese Origin

  1. RuoYi v3.8.5 framework: Chinese open-source admin framework, all error messages in Chinese
  2. Chinese UI text: Landing page includes "website under construction" and "complaint email" in Chinese
  3. Developer namespace: "com.bobo.test" -- "bobo" is a common Chinese nickname
  4. Ximalaya SDK: Reference to the Chinese audio platform in the APK
  5. JavaScript comments: "dynamic refresh JS", "generate 4-digit random number" -- in Chinese
  6. Alibaba Cloud: OSS bucket in Singapore -- the standard deployment region for Chinese operations targeting Southeast Asia
  7. Gname.com registrar: Singapore-based registrar popular with Chinese operators
  8. OSS bucket name: "lbma" (London Bullion Market Association) -- gold/forex theme consistent with Chinese investment scam patterns
  9. WeChat detection: Landing page checks for the micromessenger user agent -- targeting WeChat users

No single artifact would be sufficient. Nine independent indicators across code, infrastructure, and content create HIGH confidence in Chinese origin.

OPSEC Failures

The operator made at least seven distinct operational security mistakes:

  1. Developer test namespace com.bobo.test left in the production binary
  2. APK certificate contains plaintext Unix timestamp of the build time
  3. Site config endpoint (/api/common/getSiteConfig) returns the full infrastructure map without authentication
  4. CAPTCHA disabled on the admin login panel
  5. RuoYi version string exposed on the root endpoint
  6. Chinese language artifacts throughout (comments, error messages, UI text)
  7. Adobe Photoshop macOS metadata in the mobileconfig icon

The unauthenticated config endpoint is particularly egregious. Hitting webapi[.]goldfxbb[.]com/api/common/getSiteConfig returns a JSON response that maps out the entire platform infrastructure -- domain relationships, feature flags, and configuration details -- without requiring any authentication. It is the operational equivalent of taping your network diagram to the front door.

MITRE ATT&CK Mapping

TacticTechniqueIDImplementation
Initial AccessPhishingT1660Social engineering via messaging apps
ExecutionNative APIT1575JSBridge native code execution
PersistenceWeb ClipT1398iOS mobileconfig installation
Defense EvasionMasqueradingT1655.001Disguised as legitimate trading app
Defense EvasionCode Signing Policy ModificationT1632Custom TrustManager bypasses SSL validation
Credential AccessClipboard DataT1414Clipboard monitoring via WebView
DiscoverySystem Information DiscoveryT1426Device info collection (CPU, memory, IMEI)
DiscoverySystem Network ConfigurationT1422Network state monitoring, MCC query
CollectionLocation TrackingT1430GPS coordinate collection via LocationUtil
Command and ControlWeb ProtocolsT1437.001HTTPS communication via OkHttp
ImpactFinancial TheftT1657Fake trading platform steals deposits

Indicators of Compromise

File Indicators

# GoldFX APK
SHA256: 31b0624d16882eec282adc3817b18e4c8b3c80a9dbaa82e057a902cf7a27732b
MD5:    1ff84128a336abc72a3c2944608dd952
SHA1:   39d8cd558c8ed1e2fb17efdf627663f728f3a77f

# APK Signing Certificate
SHA256 Thumbprint: 430516c18afa0c9b8c90c90609aa5dd2833e878cbff4fe5791234917011afa0b
Serial: 0x74658c3
CN: qymi
O: qa1769868794059

Network Indicators

# Distribution Domains (defanged)
gfxuni[.]top                     (distribution gateway)
goldfxbb[.]com                   (primary platform)
goldfxee[.]com                   (backup platform)
gfdluni[.]top                    (APK/mobileconfig download)
igmails[.]vip                    (complaint email domain)

# Subdomains (defanged)
h5[.]goldfxbb[.]com              (victim trading frontend)
webapi[.]goldfxbb[.]com          (backend API)
adminapi[.]goldfxbb[.]com        (RuoYi admin API)
bitadmin[.]goldfxbb[.]com        (admin panel)
h5[.]goldfxee[.]com              (backup trading frontend)
webapi[.]goldfxee[.]com          (backup API)
adminapi[.]goldfxee[.]com        (backup admin API)
bitadmin[.]goldfxee[.]com        (backup admin panel)

# Cloud Storage (defanged)
lbma.oss-ap-southeast-1.aliyuncs[.]com    (Alibaba Cloud OSS)

# Live Download URLs (defanged)
hxxps://gfdluni[.]top/app.apk
hxxps://gfdluni[.]top/app.mobileconfig
hxxps://webapi[.]goldfxbb[.]com/api/common/getSiteConfig

# Operator Contact
support@igmails[.]vip

Behavioral Indicators

# Android Package
com.nuiy.uuxe                    (package name)
com.bobo.test                    (developer namespace)
com.nuiy.uuxe.H5Activity         (main activity)
com.bobo.db.HistoryDatabase       (Room database)
WebViewJavascriptBridge           (JSBridge framework)

# App Behavior
SSL certificate validation bypass
GPS location collection
Clipboard monitoring
Network state monitoring

Immediate (24-48 hours)

  • Block all identified domains and IPs at the network perimeter
  • Check enterprise MDM for devices with package com.nuiy.uuxe installed
  • Report domains to Cloudflare abuse (phishing/fraud classification)
  • Alert any users who may have visited Booking.com-adjacent investment platforms

Short-term (1-2 weeks)

  • Submit IOCs to ThreatFox and URLhaus
  • Report to Gname.com registrar for domain suspension
  • Alert relevant CERTs (IN-CERT, SG-CERT) given targeting indicators
  • Search for related samples on MalwareBazaar using the TLSH fuzzy hash
  • Monitor crt.sh for new certificate issuances on these domains

Medium-term (1-3 months)

  • Track "com.bobo" namespace across app repositories and MalwareBazaar for related samples
  • Monitor Alibaba Cloud OSS bucket for changes
  • Watch for domain rotation -- these operators will re-register under new names
  • Coordinate with law enforcement on financial fraud investigation
  • Report to Alibaba Cloud for hosting abuse (OSS bucket lbma in ap-southeast-1)

References


Published by Breakglass Intelligence. Investigation conducted 2026-03-11. 1 APK hash. 5 domains. 9 Chinese-origin indicators. 1 developer who forgot to rename their test namespace. Classification: TLP:CLEAR

Share