From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 1c 2e
cd1c2e2762b857a4e74d756ad92d05d1d0eff137 cd1c2e3217062b1780e86f2f5efc0ea110c67fe9 cd1c2ec02a475eec86be7265037220314b4ab63c cd1c2ef29e0ac71c50f117e5c58859a5dcfee8ff