From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 0d ea
cd0dea3c7da42d5c38105c52a74d8c57d09c5ed4 cd0dea51cb1df6e0c9e8f9d355e390f5443e5cc2 cd0dea7a97fb75345f224e7d9fda686778b8e34a