From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 05 f3
cd05f309c121884cf45f57f4f23631fb8c3b8bbd cd05f34decd2523028041435d751ce0fffe1d1a9 cd05f3f2b9c28a8d9acf7701f044b8d1a0e58462