From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 1c
04031c532d58249e3771ff6e54779a0c07ed72df 04031c7fc62b9dbc491d9cbba0e522b3d03e2fee 04031cd22016026450559d33b94b921b4f544b79