Suspicious redirect from site detected?

See: http://maldb.com/chinesebarter.com/#
confirmed here: http://sitecheck.sucuri.net/results/chinesebarter.com/
Not flagged here: http://urlquery.net/report.php?id=8751939
and here: https://www.virustotal.com/nl/url/bd41f13e0b26c23f9b2d7f5bb72010efb091223eb3926ed6e870aecfa9326625/analysis/1389189363/
malware redirect: http://labs.sucuri.net/db/malware/malware-entry-mwblacklisted35
Suspicious code hick-up: chinesebarter dot com/oc-content/themes/bcute/js/jquery.uniform.js benign
[nothing detected] (script) chinesebarter dot com/oc-content/themes/bcute/js/jquery.uniform.js
status: (referer=chinesebarter dot com/index.php?page=login&action=recover)saved 19585 bytes d74412be6b42d54653ab803e53963ea11d20cac5
info: [decodingLevel=0] found JavaScript
suspicious:
See: http://zulu.zscaler.com/submission/show/2ac8fbff8d77c2cd055f63965ae18026-1389190058
See a.o.: http://jsunpack.jeek.org/?report=f24862ef45d6dea454b89d57520c64a4ac19cd35
Potentially suspicious on Quttera’s: /oc-includes/osclass/assets/js/jquery.min.js
Severity: Potentially Suspicious
Reason: Detected procedure that is commonly used in suspicious activity.
Details: Too low entropy detected in string [[‘=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26async=%26=%26=%26=%26=%26=%260=%26=%26=%26=%26=%260=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=%26=’]] of length 539 which may point to obfuscation or shellcode. (unknown html rfi-eval adware code)
Threat dump: http://jsunpack.jeek.org/?report=e8b7c625ae34e19e04099b6c877717c7e7f0347d
File size[byte]: 92555
File type: ASCII
MD5: 3A728460147FB9AF7FAF0E587B9FBF42
Scan duration[sec]: 21.799000

polonus