QQ Worm Malware

Published: 12/23/2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

What is QQ Worm Malware?

The QQ worm is a type of malicious software that spreads through the popular Chinese instant messaging service, Tencent QQ. Its primary goal is to steal user credentials, such as account usernames and passwords, by tricking users into executing a malicious file disguised as a harmless image. This worm leverages social engineering and the trust between contacts on the platform to propagate rapidly, compromising accounts and exfiltrating sensitive data. Although its initial surge was years ago, its techniques remain relevant, and variants can still pose a threat to users of the platform.

When was QQ Worm first discovered?

The QQ worm, also known by aliases like Im.worm.Win32.QQ or PSW.QQPass, gained significant attention around 2007. Security researchers at firms like ESET and others began documenting its spread among users of the Tencent QQ instant messaging client during this period. It quickly became a notable example of malware using social platforms for distribution.

Who created QQ worm malware?

The identities and number of individuals behind the QQ worm remain unknown. Like many malware campaigns focused on widespread credential theft, the creators have maintained their anonymity. The worm was likely developed by individuals or a group seeking to profit from selling stolen account credentials or using them for further malicious activities.

What does QQ Worm target?

The QQ worm specifically targets users of the Tencent QQ instant messaging application, which is predominantly used in China. Its focus is narrow: it aims to infect Windows-based systems running the QQ client to steal login credentials. While it doesn't target specific industries, its impact is concentrated on the massive user base of this social platform, affecting individual users and potentially any organizations where the application is used.

QQ Worm distribution method

The primary distribution method for the QQ worm is through the Tencent QQ instant messaging platform itself. A compromised user's account sends a message to their contacts, often containing a seemingly innocent phrase and a file disguised as an image (e.g., with a .jpg or .gif extension). When the recipient clicks the file, it executes the worm. The worm then hijacks the new victim's QQ client to repeat the process, sending the malicious file to all of their contacts and continuing the cycle of infection.

Technical analysis of QQ Worm malware

The QQ worm operates through a straightforward but effective infection chain. Once a user is tricked into running the malicious file, the worm typically copies itself into system directories and creates registry entries to ensure it runs every time the system starts. This establishes persistence. Its main payload involves monitoring for the launch of the Tencent QQ client. When the user attempts to log in, the worm captures the keystrokes or intercepts the login data, sending the stolen username and password to a remote server controlled by the attacker.

Tactics, techniques & procedures (TTPs)

The QQ worm utilizes several common TTPs found in the MITRE ATT&CK framework:

  • T1589.001 (Gather Victim Identity Information): Steals user credentials.

  • T1059 (Command and Scripting Interpreter): May use scripting to execute its payload.

  • T1566.001 (Phishing: Spearphishing Attachment): Spreads via malicious files sent through trusted contacts.

  • T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys): Modifies the registry to achieve persistence.

  • T1140 (Deobfuscate/Decode Files or Information): The executable is often packed or obfuscated to avoid detection by antivirus software.

  • T1041 (Exfiltration Over C2 Channel): Sends stolen data to an attacker-controlled server.

Indicators of Compromise (IoCs)

Detecting a QQ worm infection involves looking for specific signs of its activity. While specific hashes and IP addresses for older variants are less relevant today, the behavioral patterns are key IoCs:

  • Unexplained messages being sent from your Tencent QQ account to your contacts.

  • Creation of suspicious files in system directories like C:\Windows or C:\Windows\System32.

  • Unusual new entries in the Windows Registry run keys, particularly HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run.

  • Anomalous network traffic to unknown IP addresses, especially after launching the QQ client.

  • Sudden, unexplained account lockouts or evidence of unauthorized logins.

How to know if you’re infected with QQ Worm?

If you're infected with the QQ worm, the most obvious sign is your friends telling you they received strange messages from you containing a weird file. You might also notice your system running slower than usual or your antivirus software flagging suspicious files. Another major red flag is receiving notifications about unauthorized login attempts to your QQ account or discovering your password has been changed without your knowledge.

QQ Worm removal Instructions

If you suspect an infection, disconnect your system from the internet immediately to stop the worm from spreading or sending data. Change your Tencent QQ password from a separate, clean device. Next, use a reputable antivirus or endpoint detection and response (EDR) tool to scan your system and remove any detected malicious files.

For IT professionals or businesses worried, Huntress's Managed EDR can help identify and remediate threats like this by analyzing suspicious processes and persistence mechanisms that standard tools might miss. Manual removal can be tricky, as it involves finding and deleting the worm's files and registry entries, which is best left to experienced users or security tools.

Is QQ worm still active?

The original QQ worm is not as widespread as it was in its heyday. However, the techniques it pioneered are timeless. New variants and similar credential-stealing worms targeting various social media and messaging platforms continue to appear.

Bad threat actors constantly adapt these methods, so while you may not encounter the exact 2007 version of the QQ worm, the threat of malware spreading through instant messengers is very much alive and well in 2025.

Mitigation & prevention strategies

Protecting your organization from the QQ worm and similar threats requires a layered defense. It’s not about just one tool, but a combination of smart practices and powerful tech.

  • Security awareness training: Teach users to be suspicious of unsolicited files, even from trusted contacts. If a message seems weird, it probably is.

  • Strong password policies & MFA: Enforce complex passwords and multi-factor authentication (MFA) wherever possible. This makes stolen credentials much less useful to an attacker.

  • Endpoint Detection and Response (EDR): Deploy an EDR solution to monitor for suspicious behavior. Legacy antivirus might miss the file, but a good EDR will spot the malicious activity.

  • 24/7 Monitoring: Threats don't stick to business hours. Having a team like Huntress SOC monitor your environment 24/7 ensures that even if something slips through, it's detected and contained before it can cause real damage. This proactive approach is key to stopping threats before they become disasters.

FAQs

The QQ worm is malware that spreads through the Tencent QQ instant messaging app. It tricks users into opening a malicious file disguised as an image. Once executed, it steals the user's QQ login credentials and sends them to an attacker.

The worm infects systems when a user clicks on and runs a malicious file sent by a compromised contact on Tencent QQ. The worm then uses the newly infected account to send itself to more contacts, continuing the cycle of infection.

While the original QQ worm is less common, the methods it uses are still highly relevant. New worms and credential stealers continue to leverage social media and messaging apps for distribution, making this type of threat persistent and dangerous.

Organizations can protect themselves by implementing a multi-layered security strategy. This includes security awareness training to spot phishing attempts, enforcing strong passwords with MFA, and using an endpoint detection and response (EDR) solution with 24/7 monitoring to catch and contain threats quickly.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free