From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 05 6e
cd056e08424760c6fe5aacbf7204d987c764d4de cd056e8bc7aea5f2fc12352aaa65adbf34592b03 cd056e94c03e78e30065f085dda56967a4178efd cd056ef41ce8e1aaf663f2d095f90935bd9e06c8 cd056ef4504d8b537e5c3330e2274d67573fe609