From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 d0 f3
04d0f34ae4dd1be747d842ed460a41400de97362 04d0f35ec6597845513ae0806dd2538216e452b1 04d0f35f8407657ba652d3304cb7dfd6ad7d9d6e 04d0f3dfb92aa7b098aaa29b7b251edc756746b5