From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cc d5 8e
ccd58e144f350548597a2822b3a45d339e4979f3 ccd58e235282283ca1f45e4b446318358fe8d04c ccd58e649e7b6b4dc6f9fc475c13fe7c5910452d