From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd b1 f1
cdb1f10a33c37d643cbf0263152fd32cc56a595c cdb1f12ea331c330aa452882ae447da063633443 cdb1f156d3c62eb1238293e10807b965e8c0869a