From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 d0 3a
04d03aad69871997801a4703a49e414950c29971 04d03acd38fed20c729c2dd867d97cbd81be14ad 04d03ad96b3ff49e684f1efda6ab3a1353865e0d