From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca ce
03caceba0fa3dce48156389d401af80198c74da3 03caceba545606eec1eaf84b04519ae8d80356b5 03cacebf89cfb604fa8ec14bde180db4dce3c873 03cacee9201aef736b15585eb1152d4dcaf6fcf1