From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 5c
04035c21a268d0a33efad65e0c905dfd3675282b 04035c4ada30e0667b01e3404ef2fd6b9394bcfe 04035cfb95520cd3a5b6c02fc27916a332245789