Boo, bad article.
Here's a better one:
https://www.fortinet.com/blog/threat-research/iot-malware-gayfemboy-mirai-based-botnet-campaign
Highlights:
Upon execution, the malware displays the string “twinks :3.”
The malware uses the string “meowmeow” as a trigger to activate its backdoor functionality.
The known C2 domains include:
cross-compiling[.]org
i-kiss-boys[.]com
furry-femboys[.]top
twinkfinder[.]nl
3gipcam[.]com