I've done some research in case of Amazon ransom and found their sites actually contains obfuscated redirection code that leads to another server, full of exploits.
Below is the links I've gathered from there.
Page with exploit pack, gives fake 404 error, code obfuscated
hxxp://6g12w.ru/indexx.php?tp=8b797d0916c09fa8
6g12w.ru
IP: 85.15.231.110
inetnum: 85.15.231.107 - 85.15.231.122
netname: LE_Collocation
mnt-by: latvenergo-mnt
descr: SIA "Projektam.lv" clients
country: LV
admin-c: SL666
tech-c: SL666
status: ASSIGNED PA
mnt-by: projektamlv-mnt
changed: meistars@projektam.lv 20110308
source: RIPE
person: Solution Solution6
address: SL666
abuse-mailbox: solutionsolution6@gmail.com
phone: +37126546676
nic-hdl: SL666
mnt-by: projektamlv-mnt
changed: meistars@projektam.lv 20110308
source: RIPE
Trojan ransom similar to that located on Amazon WS
hxxp://6g12w.ru/d.php?f=236&e=2
There can be more files, I just deobfuscated page and quickly looked inside.
Amazon ransom I've examined to get this results
hxxp://kinvivifas.s3.amazonaws.com/index.htm
Binary itself
hxxp://kinvivifas.s3.amazonaws.com/xxx_video.exe
Exploit PDF (Exploit.JS.Pdfka.eka) extracted from sploit pack code:
hxxp://6g12w.ru/games/2fdp.php?f=236
Some malware Java package (Exploit.Java.229)
hxxp://6g12w.ru/games/worms.jar
+ some other stuff for Java
hxxp://6g12w.ru/games/java_trust.php?f=236