From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd b1 c0
cdb1c0486c8e19bf8273a4d717c1b5c68b68cfa8 cdb1c0e61fcccd4da2c34a8962a172c0b781fd4d cdb1c0fe0217194f4d6dd5c25a5caf2fbd0ac15f