It all starts with a spam evil (described here)..
The link goes to a URLquery report that seems pretty inconclusive, mentioning a URL of [donotclick]overcomingthefearofbeingfabulous.com/xjvnsqk/fbktojkxbxp.php [an apparently poorly secured server at 126.96.36.199, Total Internet Solutions Pvt. Ltd in India] that just does a redirect to a spammy diet pill site at thefxs.com [188.8.131.52, Linkzone Media Romania] if you have a Windows User Agent set.
As Techhelplist says, set the UA to an Android one and you get a very different result. In this case you get bounced to a site hosted on 184.108.40.206 (3NT Solutions / Inferno.name)
[donotclick]mobile.downloadadobecentral.ru/FLVupdate.php then to
[donotclick]mobile.downloadadobecentral.ru/FLVupdate2.php from where it attempts to download a file FlashUpdate.apk
3NT Solutions / inferno.name is a known bad actor and you should block all their IPs on sight, in this case they have a netblock 220.127.116.11/20 which I strongly recommend that you route to the bitbucket.
FlashUpdate.apk has a VirusTotal detection rate of 22/47, but most Android users are probably not running anti-virus software. The Andrubis analysis of that .apk shows a network connection to 18.104.22.168 (Netrouting Telecom, Sweden) plus (oddly) some pages loaded from ticketmaster.com.
It just goes to show that what you think might be harmless spam can actually be something very, very different if you access it on a mobile device.
UPDATE 2014-05-25: Note that overcomingthefearofbeingfabulous.com has been cleaned up and appears to be no longer compromised.