Ok now,that's a pretty "funky" one...
It's being injected in misconfigured sites out there during last week - you can easily find few example complaints via google:
http://www.google.com/search?q=94.247.2.195%2Fjquery.jshxxp://94.247.2.195/jquery.js
--->
hxxp://94.247.2.195/news/?id=100
So far it can be trivially decoded thanks to Malzilla, and shows us the following...
hxxp://94.247.2.195/news/?id=2
Which is a pointer to pdf - Result:
0/40 (
0.00%):
http://www.virustotal.com/analisis/e85487bf540c8011c2aafd4369109df3Plus,a pointer to a swf as well - Result:
0/40 (
0.00%):
hxxp://94.247.2.195/news/?id=3
http://www.virustotal.com/analisis/b17f0747e571ab126f95bad30bc0ad21I'm not really able to successfully decode them statically without executing them though,any ideas?
I've got the impression that the .swf is more or less the container of a xor key,
that is being used in order for the pdf's contents to be decoded...
Or i'm i in a completely wrong direction,and i should better go grab myself some extra coffee?...

Password is "
infected",as always...