From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 1c 55
cd1c550d14b48a583fcb7cff3c729bc0b2270bf0 cd1c5579b4374494bdc5cb114a4495c100e06eb3 cd1c55c3c4bec735d3a74c2e56ded804f858a642 cd1c55f72bb0feb1041886c8c2ac5a9761be10ac