From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 03 da
cd03da47a8aa8adf599d4d1c51f9e478ad717f70 cd03da4ec83a1afce2250f883930edd9494c2ecd cd03da91b945f81c4984a5baeb11c1b9163e8ace cd03dab27c9e36a2ea9952fc8f52d02409900d10