From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 0d 35
cd0d3501807565ad2baaa8d8dd93e2d8eb78ea33 cd0d35a19231d46d57b2c1181a334fe0f0e162c0 cd0d35ab2b0c6f45a9083656f1d3dcbec384b575