From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 3a
04033a4b0b2fcd7d8b47b88c5ee45c0525d72da6 04033a5420915f535b5a66ee07596f825daafc91 04033a77a7814450325504345e03bb2747d3d237 04033ad5af8b282730545436bb7fb014656a0055 04033af42cabbe9c96191ebb491cda8881928b80