From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd d1 e2
cdd1e200e4e6139a560380218a672f24cdc64a3a cdd1e21a5707355c5a10fbc3d495fb8b9d216cd6 cdd1e224395a00fa056336997bc99b0ada6658eb cdd1e24c3fb4ab866add6cf1e59559e436e2cfd6 cdd1e2dfbccb345a22dc505d4220da11ed538770