In the second part of our series on malware, researcher RussianPanda looked at Pure Logs Stealer and its core payload, which is based on the code of the Pure Crypter, and how it works.

Click for details.