From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 04 fd a6
04fda648fcdce0887b49dcf2466289a04dc81cbb 04fda68a2ee4cb840c17960e80db930aaf0a5db8 04fda6b7d5e4438241d2ef21115e625aed342b48