From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 b0 c1
04b0c13cccf105ea68a9f012814ce859c048ddec 04b0c15830950e45c38f9c22ef80219c09b36b1d 04b0c173221807f7ec09a8b4e723afb19b038423 04b0c1baa4d03ba764a9070a6ed673906566c952