From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 27
040327bee0244bc98777b35f85f249d501bf5e31 040327d919082d9781112b26415566144cadde75 040327f21fb821c201a71cd85f3bfd69bb363e87