From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 00 87
cd00874372ff1dd6bced833dc526a57f5d297515 cd008780ec4de68756bf9c57a6e871959667f1dc cd0087ca4dbe4b439a7dc45d9a9041b06d4e2eec