From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 0d d4
cd0dd431fdc0576449d0de80273990629d331b0a cd0dd4640fa198d640a2cb45ad5e337c9c30fd7a cd0dd46c2af9a6486e7e7a947ea73d2df970ad02 cd0dd47dd74436d193926f5df620c3f27bfe8969 cd0dd4ccc70a45070fdec407c1cfa6ae76a80670