From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 07 e1
cd07e1337786b6dcac6a69829e5c12d28d2e92ed cd07e14b98614f5a8d6da173021dd771deda45e0 cd07e1c65b150dee80a5fefceb5c33a3fb817378