From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd d7 d1
cdd7d131989aacc52e330525fb01868a58af3f3b cdd7d191ce97775e51cb634caa30b96d76f75d97 cdd7d1f13102b8dc68a9d75f0650db61f00ecf34