From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 2d
04032d11d60fac9e5146327484b44721a80b75a5 04032d5d8aab41560cd72fa76e70cff24c783441 04032d7e61e05649a5249a0a5c1e80cb76999780 04032defce4353c545cbf131c6564e7013949b74