From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 d0 bf
04d0bf7268d6464eae09433812f42a0ef0863912 04d0bf75f0bf4c5d7c86c4dc2f645c6c810a6ba9 04d0bffaf6afdd7487a91a7b59c665ebe1ffcd08