From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 05 d0
cd05d01eff6dfbed695782a70de48ed1426403a6 cd05d06d3d49600917766ea4833729cac404b4a4 cd05d0b3a2f1d85a6af6d38920ce091a1de76f5a cd05d0e481a6ba4100b5b729b1394cda3dd03a2c