From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 2c dd
042cdd0c7a3677f79a920ef3525c929a0a5a38aa 042cdd806bf18f440184b281c306658c2dc613b6 042cdd935142a5656b4d637bbb3cc8a2ce9a8753 042cdd9ee5269f13c31f0c288b0836151e6c3f80 042cddfcf3960a9cb9e83d31cab527e6bb5655d8