From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 e0
0403e00f638404310a321aa7c2bc0c392a94b6dd 0403e029211798c80245b4b895f032688c6d671f 0403e03863535d11dadfa343f71bb03ace7e8507 0403e0c8f5bc98b1663f28068802d9091b960bd9