From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 fd 18
04fd1846e6156eff8faf3659fd28e7ffe36a424e 04fd1856083c972da7b87ead7008f6a71af2b78f 04fd18d89c90061adb83bcc0c64b90a30f3a2657