From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 03 6e
cd036e065a8ac6c80c82ad693f5a5129576452a8 cd036e13956ce0661461c85bc733cee57640e41b cd036e2c1fcd3e5a40cedc655d532ba979ce6a2f cd036ed68471b63579640f88ca7289d045d12a69