From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd d7 4d
cdd74d169c8efcfe9fe7efb6efbccc12f9638c5c cdd74d16fd4ccb416e6322386e0d78790fefcaca cdd74d204da274b331566b39b6130d3fc8ee6b1b cdd74d79def3a9e4018bc14e1674f1b80482d028