Wasted one afternoon to manually deobfuscate the js from one drainer website. (see here for the "deobfuscated" reference js and script used to generate the file)
You can use the code to decrypt the traffic and even create arbitrary payload to send to their backend server.
What's the domain of that backend server? You need to find it out yourself.
The code below is in public domain.