From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 eb
0403eb21d3a33a2e7e3665a7e27181419e941034 0403eb269aac7f84eafb7a3db8ab0560efe8a87b 0403eb63b603bc9eb6d42b0bcfe5e4dfd3027d52 0403eb6c5ee19654bbb11380c5fe76bc010003e6