From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 cd
0403cd082ba483c3aa0cf5d0e791dc1f861ed155 0403cd0e6c03eacae0db31840bca5793dfab18e0 0403cd1909f38831e4e44433ac0e18907a606b35