From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca 5c
03ca5c0acabc3dbc352da5e44e14afe407912f8f 03ca5c154cc987834ed63e9a5f740ffd203bafca 03ca5c6b72792dd663368aff8d61682d5fdfe37f 03ca5c77188c76e9f3f7912938aa278492adcd13 03ca5c8e9285b279b750b4998cb5ed94d2573ae8 03ca5cf143d7329042dd076c00aca3adf7731df6