From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 d0 91
04d0914680751eeffd8f4dbbd6a338ce812b5ca9 04d091baa80a018fa97e1436383d3c5159c130c3 04d091bb18ba4da16905c698b82e0b0bfde04b40