Instead Wepawet works good (http://wepawet.cs.ucsb.edu/view.php?hash=3569fd0e6cf79a6771a8e2295b152fd4&type=js), but I would like study it manually.
Any tips?
Quick description:
-run pdf-parser.py -f pdf.pdf > pdf.txt
-now you find obfuscated js in pdf.txt starting with "app[" and ending with ", 100);'
-copy this block into Malzilla's misc decoder tab
-replace \\x by %, then click "Decode Hex"
-now you have the decoded javascript code, it contains 2 different exploits
-copy one of the shellcode blocks %uEBE9%u0001%u5600...%u3F70%u3D72%u0000 into clipboard
-mark everything in misc decoder tab and paste clipboard content into misc decoder tab
-click on "UCS2 to Hex"
-copy all
-goto "Shellcode analyzer" , right click, "Paste as Hex"
-now you can see the payload urls