From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd d7 ea
cdd7ea1a87a4cadfc024ab9b17ecb41faf05f376 cdd7ea96af8ec35a8fd22f260bf1c64035f9df8e cdd7eabc05180e9b3ef5d6e684bb2c4d30c65173 cdd7ead7328740e7d5fc908ba6ebdb141d3acd05 cdd7eae8104265c7d64d39df7897193f2aab8153 cdd7eaff0624da14bf077b671610b6131052134a cdd7eaff71b67a3ce8d2d010fe9ad611b30e5e64