From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd b1 e7
cdb1e7050962f1193b1ea261f159f39834f8a181 cdb1e73683c6e60dd531230473ae1de2c3a59293 cdb1e78f269e079826d6cf8db0243982c104ddb0 cdb1e7bb9d213313b99031e44fc3a05b1cadf262