From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 03 db 57
03db57081f8132a77ae91dd531680231bbd8c8ae 03db5725573be55384933f0bb3db443a0fa803c8 03db57a81eed2bf50848db728023f807466b5dea 03db57a9aa6412c5ac46e1471708f18891ab6e9f 03db57b2d4b76d6f2d54cc317e2d60b5f6afd10c