From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd d1 35
cdd1352f01fa83d16b1f529e7a71291844b40951 cdd135522820ebb13d06fd26b315fb7d9b4c5837 cdd13587db3ba0d006de8fe03a70998c794a1c12