From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd a5 18
cda518c016da29c4fc32485b344a64bafeb32e73 cda518f5a1acb47d827e1211ae3107da47709bac