From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 b0 af
04b0af2c36efe90700f1e5f68cad7bde588b53e9 04b0af861a3cf675302831d5fc6908466e10ce94 04b0afaa1146010a1c53b8263484a97f276092f4 04b0afb1e560f471780441067187da88190ea519 04b0afbe751f8218a6e9cc465e67a92c51214e29 04b0afeae3d940a1e29ae3827627e1c569cbda29 04b0afee6bdbe74f5eed2fc63ab59fc40000e0aa