From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 01 f8
cd01f88b6a2c3709f042ee72a871925800552570 cd01f8e1cd8f20915673a08ff6194155cffe1c46 cd01f8f23ff04bc26d1de72832cd2a4a886a8912