From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 1c fc
cd1cfc753f297808ea6d400130116f95047caae6 cd1cfc7c7b781d50a0b8ea162fc2b2ecc562662c cd1cfca0ffc0c2cbba592a284517cdd31899df63 cd1cfcb8de271302ca36080b22fa75e9a6f50508