From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 0d 2a
cd0d2a261ba847b2cde8fa60a6958bdebdedb2be cd0d2a2ace9ae4bc107cffd0fb69d86de5dc8743 cd0d2af007e4418df1597f64f4b874c04e97c5e8 cd0d2af568d353d70a7643cdf1ae6cf72d714a7c