From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 2c 0b
042c0b62a6e295a089fc6376582ea5b294b4497e 042c0bd0fa02ce1a96dfea0d500898cbbf67fea3 042c0bffa5d9f14e534c878e82543d3735c78259