From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd c3 e5
cdc3e52dd0eef6ca4fd80f1b881c114c569c9cbf cdc3e5b9c81d1b361a968800ccd6f11b403fa4c2 cdc3e5ec0087c85772994bfce2814fa11f5a7985