From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 dd 4d
10dd4d663f1d3a879614c09e5c83e2db0e9e13e7 10dd4d67583b6527990131644177964eaf2bfa76 10dd4dfcb5e0973c1f6c5fbe34ba83333e8fc2f7