From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 26
0403264c2f5a7d7cd9bc2c6cd20a79c2245c272d 04032668313cd8419b66113e32028a427a5d494f 040326761b1998f659837a2bb3bedbc46c11d8a0