From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca 01
03ca01271c4b74531af92f6d9bb63cea4e5d072d 03ca0175853a17c58a3f08795cf7d36f5589fdf5 03ca0197a80c8b8f1a48c4b836e7acc2d8910192 03ca01d58b6f8aab26edcff4a4aa12454e27e928 03ca01e35f7a32fdd31da3724a051f4325344dc5 03ca01f2260e9b13f393d821becf7128fffe2ae8 03ca01ff81fdabe240c2e5809e62d2407c233b5e