From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 0d
04030d108807d38560120e2b75d565aff958080e 04030d2db047dbb65564c5a4a8237edbe266b7b6 04030d691f3efbcc5872830b0a2b6e7e627fbde6 04030d980c4e72676c97972758f6b44e12144bad 04030db083f93e3e13c0e940c582dc0a717b0de6