Known mailcious and attack site: https://www.virustotal.com/nl/url/a6cc8799e70228c6c010f20926f9bf9dd022705474309a9e2e7e03bb3efca1d0/analysis/1438251202/
Potentially suspicious file: /away.php?to=https%3a%2f%2fplay.google.com%2fstore%2fapps%2fdetails%3fid%3dcom.vkontakte.android
Severity: Potentially Suspicious
Reason: Detected PDF file containing potentially suspicious instructions
Details: Detected hidden CSS declaration
Offset: 5996
Threat dump: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fvk.com%2Faway.php%3Fto%3Dhttps%253a%252f%252fplay.google.com%252fstore%252fapps%252fdetails%253fid%253dcom.vkontakte.android
Threat dump MD5: 09EAA81CCF4500FD3F976DD623425960
File size[byte]: 423265
File type: HTML
Page/File MD5: 3FD2A08C697397E7B4701C28FF3D5248
Scan duration[sec]: 24.092000
Combined with XSS Dom vuln. on: Results from scanning URL: -http://vk.com/js/lib/ui_controls.js?183
Number of sources found: 153
Number of sinks found: 86
For that redirect, see:
See: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fvk.com%2Fbadbrowser.php
polonus