From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd d7 c9
cdd7c9501f37bd1f5d6cad3b0f455fc3961106f4 cdd7c987aec27c4840a6fddcf8f39f84ff805d34 cdd7c9c5040287a579969f336fc018b192fb5f76 cdd7c9cedf6c32c2dbebe8a6b26af5da4c6101b0