From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 d0 c1
04d0c1122e4ec75d464481217801757506b89b27 04d0c11367e72c262c68b0928b0534ee0539feab 04d0c12d45b8dcb5c626f9e557bd9016588b2618 04d0c133c860d4b369058e9bf208cd382ab14b0c 04d0c15b2d1a782bad8d39afac383ac4e27f6d65 04d0c1c858ab040d24cbfcdc52a1934882cfef61 04d0c1c8daa3220490543c253125c0f8a8550bd9 04d0c1d23ad05b1a82f257dfceba1f8656bd104d