Hey! People usually get logs through cracking configs, or alternatively through getting a large amount of people to download a stealer. Both work, and I'm certain there's probably other ways to get logs too; but those are the two big main ones that I can currently think of. The Stealer path's option is much easier to do so in some ways, as you do not need anything too complicated such as proxies or combolists. You just need to deceive people into downloading your viruses. On the other hand however; cracking accounts could require a cracking tool (usually just OpenBullet 2), a proxy list, a few combolists, and a cracking config.
Brian Krebs