From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 0d 33
cd0d330692dc56b6960e713be7423b728795992d cd0d33154aed175756f2f369bd2989c61e568464 cd0d3334fb2f4db82576a6d1626351ffb1c7a7d2 cd0d3383bbb05399121f5b61431299fdcdacb560 cd0d33b9de3f5bd57efd369d32d540af568f50bd