From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 d0 48
04d0480c159380ff23082dfcb62076d8577d2b74 04d048127430e172dc1ab595a4a937f660d3d2b6 04d0484d12b2580c4f8a1f9ce36ff47395f9b09b