From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 8b
04038b3901bab2563303ee84b9fa11ff1a10aa52 04038b58de68f77c6749e499e7c4a53c57fe1f1e 04038ba20a5f11c730ef8cf916127e6557329ac2 04038bbd3c97358005a59a0120a287bc11ea11c3 04038bc29e76cffa444d905a28a2c6bee4bfc1a7