From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 0f 8a
cd0f8a9379f1700b16efeca071dd319e9a0f1d08 cd0f8ab44950bd23ceee184a07cf5a0f6d81d290 cd0f8aeb63ff0ff7949d4987c7f235f1887f6f0b