From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 03 f9
cd03f91c361ff953b93f77ae8008fccd814f9fc8 cd03f975f1a08516e5978849f8fb6f1f1c51d083 cd03f99501679b9880f0ba1c90e94adca061bddb cd03f9f196dcc908a2e85d59fdefb560c61628a5