From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 2c 01
042c0104b2c7ac715a55c354937aafa85b96f22d 042c01415e47a0006efc11752e97afb6e13b9535 042c01cf7b3d9a75b6680a782d7025380487c65e 042c01dfd8a49a2ca789d79ce6df052793fe9a77