From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 0f eb
cd0feb80a4155a4d4743160f243cbb03e39f26f2 cd0feb88b71523ae0c91d7af47f256e0e7a8f192 cd0feb8f5c1f238e0e698a0c054e683caf9f880f cd0febc1598dd241b7ed7d71da36aa201a78d136