From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 4e
04034e19136d4dc592f6234647a9ec759a0425bf 04034e48a3593d8551753a42746f95b9536d208b 04034e9588b76d6e0da68d9b4e1f9da7bb8e0c85 04034eb79b7304e351566d299d2b2f8b1c55d640