From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd c3 a9
cdc3a918b7a722db9d91d10d8d44df0be298bb2e cdc3a9486078f3bd538e51f4cd62df58b06b04e1 cdc3a94b462f5a8003b421cef7d4dc38e405e1ba