From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 10 dd e3
10dde32d0aa1fb1fe8b17ad5cce885a8dd42ce9c 10dde391fea878d0464f3e8e7ef6a4417204e2bb 10dde3a80063f4b05735de33a70d6587392a4026 10dde3eef0d2bf2a6244d50ddce980bc27587218 10dde3f44239039a82815247fd4c38404d1b6442