From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 03 fd
0403fd257324bf0639bb7a10da8d2bbd07b96c76 0403fd28de039cc88db7ac28b2c3198e6b8c1c34 0403fd4d1a5a6bb14a04605a83a838b40e08bc52 0403fd563a3424511317178620a198679e0ce8ab 0403fd91c7f5d3b2cf7db4dd6f1ac0604c319bcf