From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 1c 35
cd1c353f9d5614e5b89f4534288a28713e8f9583 cd1c35c8e163f9c21cc4faddf3696beeb23c2a34 cd1c35cbca7fc7177eed54b1f1cca9607533af62