From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 05 8c
cd058c01ed2ee2b0b21ed7520ca0ace8082270d4 cd058c2c9ac63e88784dd97ede7bd10bd027995a cd058c5d97dab3d78c3668a784a417d54ae0cdfb cd058cf095242486ef3412ba093a06ee11eb4bde