From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca 9d
03ca9da25b0ec4bdfd67331024338981f9cb1332 03ca9dd5386828de97bceabba38b9e5b892cc3fe 03ca9ddadb598cf44f8b406aae732b1b840e88b4