From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 0c
04030c81ad117a8795d50f272092ebb5703fea72 04030ca2a76babcb9833edcc254161d9d3271e8b 04030cbe8c1d1cb20e99695c46ebe5d245606952 04030cdc535a1f0b06fc396a4c92722ef6058c6c