From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca 98
03ca980b78370d9279e626a5bda1c42df5a58262 03ca9848a2b133bc67d91d15e21a1dbaa741ebf4 03ca9856bc8726dd4c1d39427744671498770086