From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cc d5 c9
ccd5c9214f9d7f2e6da6d2cc8388ad174d8c2f18 ccd5c9957a592a1a765c95c93161b9a82e19e252 ccd5c9dd035d27856156dad254d45228e40135a8