From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 b1
0403b14ed7b83ae38cc388a8c7d7b76d4bbe2bb8 0403b18210467c661790898ee45ebf2046740cd0 0403b1988871d0b0eccbbe82a8e7cd358764ab8f 0403b1ab63f91b5a314adb34e34e947fcd880d9b 0403b1f95a262fa246844819b4f2dff22e391194 0403b1fea3a55be74d87a1144fdcb65ba65d431e