From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 ca f0
03caf02752f821fcb1d9d8248a2a7ffc183ecd3d 03caf04ad8702c7f5ba1be329a6ccc19de798ccf 03caf0d17151185e67bfaf9df51f17b7535b852b 03caf0d8574ab82327788a390a7332a3cc014537 03caf0e5c771e892d14a181fd821deaabd4f4ee8