From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 d0 0c
04d00c113fd6c500215e7b470de277faa9545aa3 04d00ccd330757cd4d1eb9ca3b55e3fa046c4c89 04d00cec9ce8c7a11eee3e3a388438c616b0838c