From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 a6
0403a6df6dc629380d19d61fbf2914e7c2f0bea0 0403a6e49707c3208014eb090ee22781671f42de 0403a6faf99df4da954898218f0c516b7aacfddc 0403a6fcc154c629187665b98cd37f52b5e661cb