From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 2c b1
042cb101a55654e98e8d930bec753063e4b71b21 042cb15281b17dd507f4bd550d9597a6c6fb0a15 042cb15cdfea7c99975df86edafd3aba8a060b96