From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 01 e3
cd01e310287f0e10c9af7a62c804a9a1627c3fcd cd01e32501b5aec071c291659fc6a0bc35f24a31 cd01e36fa0315d3deb49d85b455b9c802750eea8