From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca c5
03cac535725a53bfae7ab2af4065584d096a9b56 03cac5dce9301c1cc47ca3d38ef21e85699cf9d2