From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca 80
03ca801d84db9277e3cd44e39af760c2be0efa2f 03ca806464faf2a8609169d8214897737faba84a 03ca80991fd848b4c98677c96dba3c8677bb5273 03ca80bde1c192262ffe7e4aaf34ac741a933162 03ca80f36dca218f263679873cc1804c98ac5800