From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 c4
0403c4228e1f9e3cfacf0f6449f91304e5b1ea5d 0403c428c0072c8f605403a61a68c467c49dd448 0403c4fa9893b0049ba7c9670b4e4925aa4143f5