From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd a5 0e
cda50e616d077a3da802acec56ceab29b1943547 cda50e7d268ac976d63297246035af84a9217c03 cda50ee3924448f953ebcddea2efd8ff562cdba8 cda50effd5be36a4dd612835fa2e037cda7b80f4