From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 d0 5d
04d05d80bf385209cd9947120159f3219fc3ff98 04d05dc38e0d6b60d36b07b373d1b5d947e5536c 04d05dce24431073155fb5531dbe794210cf4a42 04d05de7d407b9299ec3bab3a0d71b5c27b670f3 04d05df7a0406e42be3da94bcfa7cb598b11f626