From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 b0 d9
04b0d9125bceb39b8c991f59226ff6dd06bf719f 04b0d94fa12626e91a8f6413958848f830702133 04b0d9cb636b8ee60080699e1f952d12755bc2c5 04b0d9d42f2b53a6872e060b8dda8688f4b886cc