From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd b1 4c
cdb14c500c13bd8cb9f7d470f1c577c2245be966 cdb14cb169152c3cca09e5e57d262f04d2c1ad57 cdb14cefb62a66fdf558e7d89644eadd18933f26