From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 64
0403641258f4b1c51417e03d24076fcb305f06c7 040364c04ac31676c97fb8fde07057f7e95da5aa 040364e90ebc9d6d0447cb96489e75675093b1a5