From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 05 e4
cd05e43a145124142f0617d72a7f5231d6e0af17 cd05e44a2ebc55ee9f1dbf7d02bbdedbd21a49f3 cd05e47a0e66ef9873673f46e50337ca424a9d34 cd05e4b49bc858398c5fe1a13760ef40107fc3d6