From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 1c 8d
cd1c8d748a038952bc976b16e78c6c4c39bd2f43 cd1c8d97ee0b868cf9306d420a4115a62b301c77 cd1c8da6d5a95f133003370e3d5e5109eaccf734 cd1c8dc940798ea9c728bd589fd2a9b4863d2d58