From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 b5
0403b57843e38fff4cbdc630013d6b48daa46410 0403b5a12d001534c9c808bbd89267f25a4e76b1 0403b5a3a95856c68864f508ad943cf37f49cc48 0403b5d87578238d6681a75383edc13cc3c85cc8 0403b5db5ccba8b213eed872f968c0ca6af12383