From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 f9
0403f9040f3f4f2e90dcb4980200d478b89b739e 0403f90bd60f9e5c8e960bce15f3ab19bdd6c8ff 0403f9bc702fa81c5f5adc21518b1918253fe5c2