A brief algorithm for obtaining high-quality bank logs and payment system logs:
1. Select and purchase a working and up-to-date Stealer.
2. Encrypt the file to be distributed.
3. Infect victim machines (install).
4. Collect logs and a full fingerprint of the victim devices.
5. Sort and cash out the logs using any convenient method, depending on the nuances of working with each bank, app, and payment system (merchant).