From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 37 51
cd37512559c0ca7ab0abe30499fc02b3f3d3117e cd3751aaef92e0ced5b4a2c64a242fb2a9ed39e7 cd3751b691706b3eacae23f727026f6ea2433207 cd3751e5a6b16eb695f54f44efea5e7cacebb078