From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 7d
04037d01c500908fe573c918bba326c3576eec98 04037d58413b2dd2ef9c8c10af2d47fadc5e85ea 04037d974cfe8daf2d51bf3fc2eea153e071e730 04037df6b6d45ad8d67f7b53ba0ab9899d71099c