From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca 0e
03ca0e54e1f02646264fd1103a5dd2767c4ad0d6 03ca0e8a544e48998b6ec004f1156721341bc778 03ca0ec829141a97f5d4988c87a64193f048a5cb 03ca0ed5f9a61d77b5f0067820d206c0fbd9aa20