From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd c3 19
cdc31918b9c1c51d2fa1ef45d1bd71d6e7e3ff12 cdc31933e4f5b579f38a8f973b51e93742f4f704 cdc319790d04ca061e24751dae0201666adce709 cdc319c29ec8b0af2b13cec07bccdc58cc359d0d cdc319deaee15a6d0a09e35e7cce1794a62598bd